General

  • Target

    2024-02-03_d53daf63fa334317f954a44ebba1370a_cryptolocker

  • Size

    106KB

  • MD5

    d53daf63fa334317f954a44ebba1370a

  • SHA1

    27c0e2f4629aab2d70531394a3cc4d974e32c621

  • SHA256

    b07f7128a152d90730e7571b035a340ab569920e642c0d855c3ce7b27e2c6b2d

  • SHA512

    1b0e1b4985aa2e0845ede87da2eda5ea74354419afeb37d45ea08f3a545f09db5264f4f13627f4411e55450812897267bb8e92e92b51f6497d600486ef8eb1bf

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszf3:1nK6a+qdOOtEvwDpjT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_d53daf63fa334317f954a44ebba1370a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections