General

  • Target

    2024-02-04_641b8849091189c2e788403bb4ec2d7d_cryptolocker

  • Size

    117KB

  • MD5

    641b8849091189c2e788403bb4ec2d7d

  • SHA1

    b767fa7decd6ac1efe8c3e44585cec7529c16979

  • SHA256

    0e9d31ee1a630def99b9d8c07904b4da137311a76f348dea2f3d7cf610498fed

  • SHA512

    edc5fc7b97ec4cce9f1d34a55821f7614a0d778e106dd2bb7b31873766a1dd35af97b93b955775ee2ba36dedfd22e919a9d0043c49c98f482ed3decadfbcd4a9

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qaa6:z6a+CdOOtEvwDpjczj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_641b8849091189c2e788403bb4ec2d7d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections