General

  • Target

    2024-02-04_caa636c3ae4fa30aca701b008688b904_cryptolocker

  • Size

    61KB

  • MD5

    caa636c3ae4fa30aca701b008688b904

  • SHA1

    626dda0be93503d241ea0e982e0090ce19334377

  • SHA256

    a3abcba1fae9b45e0a825f82ae8c19b6911b2cb13dd97e4f3a29a02b1049f1ca

  • SHA512

    6ce247f4a8b7c54dac49a385ff15244ff9101957252ab52fc5891b0633542029b14d49141e459c3c9dc645dac42b6ed9863857142add5f240ccf7a5b3d77dee8

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVr:zj+soPSMOtEvwDpj4kpmeLmnh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_caa636c3ae4fa30aca701b008688b904_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections