General

  • Target

    2024-02-04_86c607826a3b8f4894b3ac87b0c2c0c5_cryptolocker

  • Size

    81KB

  • MD5

    86c607826a3b8f4894b3ac87b0c2c0c5

  • SHA1

    4809f30f098783ae89d6e56df43e334c45c81ecb

  • SHA256

    983c7166db4d521c736e023aebbd8523d4f583741fc47d5af0efac578c38ce9b

  • SHA512

    c02ddf330d8cdb257278d4d2954c62451a8523b57a1ea47d6840689650c3cd15025bc7b1df7d372535f2f1b392b910495f9c537ea72c4402094c348fc0be7479

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT74:T6a+rdOOtEvwDpjNE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_86c607826a3b8f4894b3ac87b0c2c0c5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections