General

  • Target

    2024-02-03_52132fcac767022206c8ab131ab5be4f_cryptolocker

  • Size

    89KB

  • MD5

    52132fcac767022206c8ab131ab5be4f

  • SHA1

    d0ae41e7a860c65e80e400bad791155beb3a4dd3

  • SHA256

    e16805a0f3d27e2853fb40eca5e76e5a03040cc7d6d8023ab0a5c0a1676da783

  • SHA512

    9b1e103081b86e8d04412e7898feef77b67e3f30ca5e8af2db8cf274f8087ad9f9f558708a62857c8f57a41d164b47aaf917be27b65e190c312e8a429f5e6a1a

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhb:zCsanOtEvwDpjQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_52132fcac767022206c8ab131ab5be4f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections