General

  • Target

    2024-02-13_d47d5d812ef90b6f7fa8edd39c525d5b_cryptolocker

  • Size

    106KB

  • MD5

    d47d5d812ef90b6f7fa8edd39c525d5b

  • SHA1

    9d957fe5c133cf76d5a1a055bd799f7c8b738f6b

  • SHA256

    f880a51a110348d80e97c5a509408cb75b3b32aa826f40c07aa747561119f864

  • SHA512

    2c4522e5dc7f0a017d0c190c6ef6f69087a6ee7079bc2ed913f3961d0b347c93ab14203fffc604ded8000e550c8fab05614c1fbaeb59048a4bbd7720fac2e678

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks+:1nK6a+qdOOtEvwDpj+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_d47d5d812ef90b6f7fa8edd39c525d5b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections