General

  • Target

    2024-02-17_95d45a58dc93925d4d17235a192999e8_cryptolocker

  • Size

    147KB

  • MD5

    95d45a58dc93925d4d17235a192999e8

  • SHA1

    60f2f2ffe9f97585c8269a1165784b7ead0977b1

  • SHA256

    64f52ca89790e714017a0516e9dec1b3d6926c74f147747d9b882cbb837eb48a

  • SHA512

    69e7db0676dbef2813132566f2a20ddcaf7cf25f3ae83b1e1c62c05cde0574bf45805dfc8c1c64b182f88a90fd9e204e99442bb71f9ee3bc2a42c7da06f51c1f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eSZ:z6a+CdOOtEvwDpjcz8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_95d45a58dc93925d4d17235a192999e8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections