General

  • Target

    2024-02-14_109764feb4a2fe624056b815054ebcd0_cryptolocker

  • Size

    93KB

  • MD5

    109764feb4a2fe624056b815054ebcd0

  • SHA1

    97542391de37b6948c439824a9883a75717dfd55

  • SHA256

    b60308ce268057dec05bf2f0838c126af47aa7038247d5005112173c9f41f1db

  • SHA512

    2a16f52e3bc415a902b5e51c5b79da687564098caf0c3878a4555962f1a1ef127a7c46fe1c090fc503c4b00a930f41213970664e9cc0cdd0748b7afbd96e41ff

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/sd:zCsanOtEvwDpjBU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_109764feb4a2fe624056b815054ebcd0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections