General

  • Target

    2024-02-04_433365e50f72fa0066c86c76e348cf2e_cryptolocker

  • Size

    80KB

  • MD5

    433365e50f72fa0066c86c76e348cf2e

  • SHA1

    1ce9748251940ecc01310881585fa952a0d853cb

  • SHA256

    8754706c897eb087d55c1d49b901fcc3fcb05a6bd321527c792a43059ba331eb

  • SHA512

    1efaaa8dce991cde8217015af4b353f1666d162f4e35ebeca43670d1c7674c9bc712ba33c3eaf0d06778fb3643dbfc17fedcc8786ee4fd2e4529865b83fc63bb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0Q:T6a+rdOOtEvwDpjNt3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_433365e50f72fa0066c86c76e348cf2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections