General

  • Target

    2024-02-04_c839bef99784dc50abeca9ef3c5c4414_cryptolocker

  • Size

    56KB

  • MD5

    c839bef99784dc50abeca9ef3c5c4414

  • SHA1

    df60a468b470f039bfbccb4f672e6003f93498d3

  • SHA256

    228d2dbc4d9b574edecfe59a2878f40f7fc7fa9c83e8aac11c9f50407e23d7ff

  • SHA512

    87038ee192638776147a1e90768b12404ca188427f7ed37ea3a77cbd871674b16eb72c25cf3ddc365c3eaf91928c68489ca513c3c72e0d35d2975db1bc327245

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appN:z6QFElP6n+gKmddpMOtEvwDpj9aYa9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_c839bef99784dc50abeca9ef3c5c4414_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections