General

  • Target

    2024-02-13_4ee8ad3d6cc1f23a28f209a0e8dde9e5_cryptolocker

  • Size

    62KB

  • MD5

    4ee8ad3d6cc1f23a28f209a0e8dde9e5

  • SHA1

    855a7d008416c7dcac8e59222c20a9a41839af7e

  • SHA256

    c38351c4492c55702804a3459ce6f74ad6d12bae6deda47dd1bb94137a9483af

  • SHA512

    f85ab100c3dd985269f7a3cc3a7f0da57953214754c1193bb8bf010061625bda2bdbb5f904c15d40165ca5ffd16b0b7b453c6537f5f6c343aa281dd410fbd0b0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoj:1nK6a+qdOOtEvwDpj9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_4ee8ad3d6cc1f23a28f209a0e8dde9e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections