General

  • Target

    2024-02-14_1a4617df4ca514e44da2cda5db16af7f_cryptolocker

  • Size

    55KB

  • MD5

    1a4617df4ca514e44da2cda5db16af7f

  • SHA1

    5068f45fb273f6ac647f29abe36b03d8aac8a6d3

  • SHA256

    693f9663846f958efa6926ea1e4ea2c4aab3d10a0823dc613ec938e801f40be6

  • SHA512

    f491a42a04f6e51b042129e91ca285f7fef75bc95b19d8059f2abe7eb7842297f7cf4ccdd171a2c502b9039cee144be09461ad334918e1604dd6458b7228aef1

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axcl:z6QFElP6n+gKmddpMOtEvwDpj9aYaQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_1a4617df4ca514e44da2cda5db16af7f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections