General

  • Target

    2024-02-13_5689332e13e1e40f00c1b00a4fa5a5ae_cryptolocker

  • Size

    71KB

  • MD5

    5689332e13e1e40f00c1b00a4fa5a5ae

  • SHA1

    b1b49e0addd52ecffcf472f039c5f90852b553fe

  • SHA256

    52f20462e808f58288e4911e1ac8d54c6658c85aae0c755d2eda0d9f44da20a5

  • SHA512

    66611682180a9722b03b24114a0580bc833099783c74e70ddf7754e9326e9f7f6e09b9e5dd623d3192a82b414e6d7b2ab2ebfe69a06d4dbbbaa7401c3532d440

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal/:1nK6a+qdOOtEvwDpji

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_5689332e13e1e40f00c1b00a4fa5a5ae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections