General

  • Target

    2024-02-14_83da97d8744eb16ff9e539fe83484390_cryptolocker

  • Size

    62KB

  • MD5

    83da97d8744eb16ff9e539fe83484390

  • SHA1

    c1652a1764eaaef05e78c96d88249972c977f69f

  • SHA256

    651e9379b160468d6ed1ffacb15b7d9bb07dd1349eb6d4c67dc982df65d85a4a

  • SHA512

    40a96df69d7ec0542c5bf5f74e1ce05e4b4b9a2d3e9430be3911b92e23c88c3d4c647f608fa699e5505e7b1fba519ae985c4059aaa40d97b61b89ada175b74b4

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVzCi:zj+soPSMOtEvwDpj4kpmeLmnZn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_83da97d8744eb16ff9e539fe83484390_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections