General

  • Target

    2024-02-03_005ee39fe487b56fb2251f51c3707929_cryptolocker

  • Size

    107KB

  • MD5

    005ee39fe487b56fb2251f51c3707929

  • SHA1

    4e00a0a0d5080a85cbd3f18d6217ff15e5c937f9

  • SHA256

    2bfb6024b5112d200d989508f036cd77b9d73395f4db28b4c0f039bc26977c68

  • SHA512

    0630c96f514c70c1dc6cefd0ff9c2914f08439bb3efc1f14c55598c42bee8735373f772f24e8a953f8d55cd4bfad30c84b6ae537db566b46985922e4d599f275

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksgEn7:1nK6a+qdOOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_005ee39fe487b56fb2251f51c3707929_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections