General

  • Target

    2024-02-17_92a3e1ff5863fa5a9f154eeb44b8a7fc_cryptolocker

  • Size

    110KB

  • MD5

    92a3e1ff5863fa5a9f154eeb44b8a7fc

  • SHA1

    5a701b03e2f159a609efb4f0fe2f3f4bb21ab403

  • SHA256

    a51165b992fedd63688e3c7fe2ffd5f790e7732b70166db1561cb78a019d9996

  • SHA512

    f5f23e95027d219e6d5ba0e009ccee749bce72b13332c07da781d2b1ff0fb7d031c9b2b722fe2dd4573adc5d75a3921eec36e489b05c7e0b3745910e9249ad97

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwMgQ:T6a+rdOOtEvwDpjLzk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_92a3e1ff5863fa5a9f154eeb44b8a7fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections