General

  • Target

    2024-02-03_1a2fe1b90e0e539d78d54968c89d2a72_cryptolocker

  • Size

    63KB

  • MD5

    1a2fe1b90e0e539d78d54968c89d2a72

  • SHA1

    0145f5535f63999795fdbf34035d5cc7d872f862

  • SHA256

    d8a30ecaf5b3c463fbd8b8a2f06dc32dbaf4f4b2b87a90f52705acc521178652

  • SHA512

    b39ecebd50e0de89082912acf32c24df82c0ffe61b48530e4c25f2f8e09ebb628fd13a8ba57bdc7810df0e37195a668877f252799d3e7c6911e81fe4a1a58083

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoI:1nK6a+qdOOtEvwDpji

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_1a2fe1b90e0e539d78d54968c89d2a72_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections