General

  • Target

    2024-02-04_51d270a96d0cc146f8d2aa8941d5b70c_cryptolocker

  • Size

    56KB

  • MD5

    51d270a96d0cc146f8d2aa8941d5b70c

  • SHA1

    406a8daef779f539fc581ce8e61cef501daff3a4

  • SHA256

    096602846c805d33a96dcbfb4ba866ebff8fcb354587f6b84ee8415ef2b1bf3c

  • SHA512

    e2924ef41b5eeed2e9e2c68b117df2cd276effc74fce9475a729fd0c2e268ef8f5560217c58157908f8319ffb0545a1d2cf7550903671819133b6b6afd1c8653

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLzbt:zj+soPSMOtEvwDpj4yzbt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_51d270a96d0cc146f8d2aa8941d5b70c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections