General

  • Target

    2024-02-12_14a4aa0c9096bc682b16c342fe604c44_cryptolocker

  • Size

    75KB

  • MD5

    14a4aa0c9096bc682b16c342fe604c44

  • SHA1

    3894c0a4b62710240779066cf3d44bd51d43b242

  • SHA256

    b97b676625a29a09018391b23b9f084ab45967f5785363c1396d4f379f7e9cf7

  • SHA512

    769a99e4b2aca013e0d1a381f33e1d59ce7b51d0867cf8e987058c27b9b466455ba687433363eb0b7bd5ea762766b518efce57f86653084c7538aa6d66eaa57f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWnd:T6a+rdOOtEvwDpjNtw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_14a4aa0c9096bc682b16c342fe604c44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections