General

  • Target

    2024-02-13_0460ea4a6a7c86e7f9fe84a71860d7d3_cryptolocker

  • Size

    91KB

  • MD5

    0460ea4a6a7c86e7f9fe84a71860d7d3

  • SHA1

    676e0f786a260623168a49ee12465ba9e2d5dbfa

  • SHA256

    d343abff2cdfff1e5ff22246526a4533ebddcfa78f93a4ed806f3e16d509b560

  • SHA512

    2990d63cd3b38633f32ef4995a8cf234b2b785c12a9848a3ef49dcde37c511edfa19c8b24c47764f4124ed6176b609c9c2e0ca5c926c544d48dfd80fe816365f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uv4:zCsanOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_0460ea4a6a7c86e7f9fe84a71860d7d3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections