General

  • Target

    2024-02-03_a666df835b9819ec9339f279a5f583bd_cryptolocker

  • Size

    107KB

  • MD5

    a666df835b9819ec9339f279a5f583bd

  • SHA1

    477743e28cc24bc58e5e3d57c0e18320c659e6e7

  • SHA256

    9854153f0aed32a505aa1fa4d621e581ac327dcff4dbdcc58e04ee882bda6fad

  • SHA512

    675f5bc0ad0ab3ee5f7cdd667dc16e392750fb1cdb7d8c549743be85328415b2d13e732ee550622b27f995858fa9fd6ad564500d179851f2d25f69e2c24b7561

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaP:1nK6a+qdOOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_a666df835b9819ec9339f279a5f583bd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections