General

  • Target

    2024-02-14_34f0b1f21a7bc7ec46bc564ed77b7e62_cryptolocker

  • Size

    82KB

  • MD5

    34f0b1f21a7bc7ec46bc564ed77b7e62

  • SHA1

    f5ac940cb94905c24153433ca203bd8dedd008a1

  • SHA256

    59515569a3349afebbefe5982dec3a7a7c820853f552e91f53384fe6184708dd

  • SHA512

    f6f0582ece8c4bf21baaa0f58751aa3b9b482182232e08ec56d582259b66e061c19c5f4b2ff7c4bb241bf58b5367aa876c5077d0fb225c39ba4a08fce4ae20f0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1F:zCsanOtEvwDpjv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_34f0b1f21a7bc7ec46bc564ed77b7e62_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections