General

  • Target

    2024-02-17_d05a3c9c8e6367fb2365a7e8121e9050_cryptolocker

  • Size

    148KB

  • MD5

    d05a3c9c8e6367fb2365a7e8121e9050

  • SHA1

    03fde2a5ed47105ee0822c7fef3ef5c9ebc11c36

  • SHA256

    8414c59d73ff058ee115c63f1456c8029a05f0eb4b4b6f0b1646185a5e051d43

  • SHA512

    1d513c1718aeca94e892a516c4f191cfd65c72a8bbf61b156cf14e0a36e0193161fcc2e5d231c638a6796a64b52735e8fb5144995b0f79fc0915c17991da047c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eSZ:z6a+CdOOtEvwDpjczE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_d05a3c9c8e6367fb2365a7e8121e9050_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections