General

  • Target

    2024-02-17_a20d4f4ead848359fa2e67ff8dd854be_cryptolocker

  • Size

    63KB

  • MD5

    a20d4f4ead848359fa2e67ff8dd854be

  • SHA1

    dfee0e27a1341d59601b15d7aa1df653dacbc3b7

  • SHA256

    e06057dc8bc855fe45c832a1dcd840a1487eef3fec11257fedfbb369ce743ecc

  • SHA512

    784dccb7bb792d065e99016d717446ae81b87d66c9927754b17bdc1a1fcaa5609430ed85d8e678b6be3c5ee9dba5e9dc513809fb26abd67d3fb4cfbb760c857c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoUP:1nK6a+qdOOtEvwDpjW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_a20d4f4ead848359fa2e67ff8dd854be_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections