General

  • Target

    2024-02-03_de938477e200f74fdc4f6e452e97f8af_cryptolocker

  • Size

    65KB

  • MD5

    de938477e200f74fdc4f6e452e97f8af

  • SHA1

    7d8dc06e270f8a5dbbe7c1860066495fbfd0a7f0

  • SHA256

    49071b075a5f9ffdacd2be97a3009b431bf108b82cd84f3697aedcbc34f9c646

  • SHA512

    85e8793fc91e74720f85fd6fde0131c9017ea0359ffed8e5200493c2e820c52397e75527343908c2aa3ac1948e13740f9ec7a62e9f6f073ba285ffce62738b8f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Uk:1nK6a+qdOOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_de938477e200f74fdc4f6e452e97f8af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections