General

  • Target

    2024-02-14_491b9c23389e5a0618070ee0419aa334_cryptolocker

  • Size

    115KB

  • MD5

    491b9c23389e5a0618070ee0419aa334

  • SHA1

    1d8c90cdbd2dc829336bc854f07e3fb69841f369

  • SHA256

    084003183d14d14abff7e0455b37529dbe218b953c52ed172c56fd944688c67d

  • SHA512

    f5faf25a9ba0b45bd64e3bc30d6f957ab208a43b8d39cc146b24d5709c226b583f4f4dea1844a31a2be6f8ed5716d9fcbd834dd808a6c5ff6b2b30cf91e125fe

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9t:T6a+rdOOtEvwDpjLzh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_491b9c23389e5a0618070ee0419aa334_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections