General

  • Target

    2024-02-14_625b82f8c2b3e0e01d77379981546c0c_cryptolocker

  • Size

    76KB

  • MD5

    625b82f8c2b3e0e01d77379981546c0c

  • SHA1

    ea5f590fd7988283b21c938fe01f9c107b8f752a

  • SHA256

    9d4945be9d8f809aac4636a3442bea7b5e0712e126c00d179b9557ae14f60860

  • SHA512

    406944d021db16b3c0c4f30700340c011f37a8b14b3d2ebc322910176e4786e45887fb61acf88c05a53b6764c003a14c8d225dced0d313eca24e934a15ea8332

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QB:zCsanOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_625b82f8c2b3e0e01d77379981546c0c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections