General

  • Target

    2024-02-13_80dd04f5b04fdd22cddd1b7b5eaf695e_cryptolocker

  • Size

    116KB

  • MD5

    80dd04f5b04fdd22cddd1b7b5eaf695e

  • SHA1

    4596dac81a4dceb9c7ccbde2c4478dc35ff916fb

  • SHA256

    c3af1e638f432b351590a7b894cf3f2f7bfd9520f9ff7c05665137efd5867fd0

  • SHA512

    c1aa6265c876b8c8149686d504f3c69012b7b5d5e93ae72759f3e3b9d112214ce391c116e3e9361d6b327bf7c80979e36e2847a4b7a7b943d5ac69f3c1e4e816

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01G:z6a+CdOOtEvwDpjcz4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_80dd04f5b04fdd22cddd1b7b5eaf695e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections