General

  • Target

    2024-02-03_944cb44534e5061a956e253baf91ffb5_cryptolocker

  • Size

    83KB

  • MD5

    944cb44534e5061a956e253baf91ffb5

  • SHA1

    6145f938845233afe1eaafee4c9f246fbc581d3f

  • SHA256

    4aafbd130eaacd35515472a7a0c33c9c0fbf388abf9b19df724b86808de53d99

  • SHA512

    86aa6101dcb88cf9e40491b0df9317da72d8448af911ccab1b59933dcbdc4b347ce14dbf4b87b6230d146e52052ef4ae00d78676a46c413ac39cb6e78f4638d9

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1W:zCsanOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_944cb44534e5061a956e253baf91ffb5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections