General

  • Target

    2024-02-04_45a856e0bd35e641f9b0581846390f02_cryptolocker

  • Size

    104KB

  • MD5

    45a856e0bd35e641f9b0581846390f02

  • SHA1

    9e21b0f4b8a010e0bd2b3dcd0d05147900c4baf4

  • SHA256

    e9351b8258b856cb71a6aa60d28c26e094cafc7a74a730e3d7e5970002e38ef3

  • SHA512

    62e51a0adbd52195a1947f18a8613118c919525103005221a983c2ce4193f9ff745f73f3571934c40ef94c0f738e6b4a3499dfea0c7ba0410173822d68c37839

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksuX:1nK6a+qdOOtEvwDpj2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_45a856e0bd35e641f9b0581846390f02_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections