General

  • Target

    2024-02-03_44f983a2c98a8c7530dd43a09ad5374c_cryptolocker

  • Size

    63KB

  • MD5

    44f983a2c98a8c7530dd43a09ad5374c

  • SHA1

    897220fef9dcd7ca6a6ce7e93dc421767bb55918

  • SHA256

    5cd0c936113395fbae36a42375e9d37304c37e717530964eb94d2465e0b993ee

  • SHA512

    86cb0606fc9b3c8d6d171da847f5054ea9e40e8aa2c36975e6c060de12455b1db01b05589aae98e354c9866e5662e2e681ae8d947713d32b59ccdbf1444e76c3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Ub:1nK6a+qdOOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_44f983a2c98a8c7530dd43a09ad5374c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections