General

  • Target

    2024-02-17_dd9feccc45d9b673e9828125728f455a_cryptolocker

  • Size

    61KB

  • MD5

    dd9feccc45d9b673e9828125728f455a

  • SHA1

    11904a4dbb48dc46654a2d2606696182063a42e6

  • SHA256

    35c1adfee6ff46b3460b57a2fed2ab23135a806cdfaffa02447542cd4f030102

  • SHA512

    a186e6e398e66a80e37c218f810aeeac7c7d7f530c117ddf0f390a177ea6906658c2408f4b87cb3f1c613defe7b6894626ef3632ceac6f23102a8d8ac6af6a7f

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5Sa9:T6QFElP6n+gxmddpMOtEvwDpjwa3x9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_dd9feccc45d9b673e9828125728f455a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections