General

  • Target

    2024-02-17_358f401ba51342b4e856c00c712e1379_cryptolocker

  • Size

    64KB

  • MD5

    358f401ba51342b4e856c00c712e1379

  • SHA1

    b1ebac1b260ddd20c9be2aad9e9a5a7e2ca5f285

  • SHA256

    9f22d32371ea3cecd82f6b485836c1e4e2aa5ab63ba41c4e27f004783fa9762e

  • SHA512

    1e8a2fdeef288cad6cabd192479bc2902753e450c78db2094f187c2c59dce3f0dc30128d3819ea16f861b633953f1c42904e3b7c2ebab2d6566479687d87bd14

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Uhr:1nK6a+qdOOtEvwDpjI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_358f401ba51342b4e856c00c712e1379_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections