General

  • Target

    2024-02-14_d53b062a04a95e591aed9b3f2f1618f1_cryptolocker

  • Size

    68KB

  • MD5

    d53b062a04a95e591aed9b3f2f1618f1

  • SHA1

    d760c87fa1e95075745b4a26df7ac53f245967fc

  • SHA256

    af0334978f792f5c7ff21a8eb5cbd84a6fe80bd62a8a073eb781ef737e5f34b5

  • SHA512

    34c95266877fd01404e3a73d4c413644c9d69654c06314c79d56d6fc2bcaff85ab8387960ed9b26ecaabb3b59e8d11de248811ea63208dedf578821f299c7e23

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBW:z6a+CdOOtEvwDpjQY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_d53b062a04a95e591aed9b3f2f1618f1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections