General

  • Target

    2024-02-03_17cf430c6f6cddf13a7e1b98b8f80a45_cryptolocker

  • Size

    82KB

  • MD5

    17cf430c6f6cddf13a7e1b98b8f80a45

  • SHA1

    a16005bb9d2726e0d6b0eb5218d56f20b0fefaec

  • SHA256

    802c407412663d932dc802e4f05551cf5ba9aec55eaef6b51e1feccd3c439332

  • SHA512

    14680dc12c7cede408c6f152cf0790bcd88e432309ee1f9a7b4757c46c48f7f958d4d5dd87d5f84d1b4896d2121a0e9ec67fd6ea7dd7167f19b6613ab40c4921

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Ef:T6a+rdOOtEvwDpjNe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_17cf430c6f6cddf13a7e1b98b8f80a45_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections