General

  • Target

    2024-02-11_43f825a15f87b68802fe157769b90335_cryptolocker

  • Size

    63KB

  • MD5

    43f825a15f87b68802fe157769b90335

  • SHA1

    c5335a854935c283b5eec35e15afc0550d4a9229

  • SHA256

    b848806b35420d53fbd0ba65f789a0e56b81d28b2a0211c21912d2b1714cce3f

  • SHA512

    cc24a7e991b3deaba1ec2704b14fc8915aad56b3ea055acdd6c23941426883261ed9150a7bbd17e7c60ee277f9560bca476b6c4c3999f36867fccec6da5c75ad

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoUE:1nK6a+qdOOtEvwDpjx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_43f825a15f87b68802fe157769b90335_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections