General

  • Target

    2024-02-04_18314ff71ae738a2d635773f60e7a63a_cryptolocker

  • Size

    90KB

  • MD5

    18314ff71ae738a2d635773f60e7a63a

  • SHA1

    32654dcffc4bd0f475e3f282aeb282f17ef73aa2

  • SHA256

    9c76e91741ce20dd3aa56c53c012167c723d325074fa4e8ff42ce30bd355dc86

  • SHA512

    8db33081db7764e7557ec55d3518e00f9b4853e64aa61332c25ef5d0aebf4b4422675cc710782be39240b658a518045b9dea2f0fd38a673f274dd039ba0b2cd8

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uv9:zCsanOtEvwDpjE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_18314ff71ae738a2d635773f60e7a63a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections