General

  • Target

    2024-02-04_617e3a850deda07c8e12f9efbe32b9e6_cryptolocker

  • Size

    61KB

  • MD5

    617e3a850deda07c8e12f9efbe32b9e6

  • SHA1

    1129e5cbdecaab40421953b7228c4dd5337d5fb1

  • SHA256

    8994c3f9a3c7105b0e45d79ecce53215de2bbb9e58606f792ac127fbbdf8043a

  • SHA512

    8fc2908bf7a484b3a140790a983fe6d5d0cfaa1da3752d43e3385f46002bda4b81433c5f296acd7ded6d95a06d1fc6e1ca5892e948bcb8a45c94862911c92cf7

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVq:zj+soPSMOtEvwDpj4kpmeLmnk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_617e3a850deda07c8e12f9efbe32b9e6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections