General

  • Target

    2024-02-18_657ff44e07cac7f8ccc38d33ce1739d5_cryptolocker

  • Size

    97KB

  • MD5

    657ff44e07cac7f8ccc38d33ce1739d5

  • SHA1

    38a7725fbe13909cba8ec5d47ec311e98374c4c3

  • SHA256

    f842d1ac7306470116b61e2d392e2a68d36a6fe32f6149dd655e9f286ed5f044

  • SHA512

    c243dc2c4751297dc19864d8e42c4fc6a68e25a2c5a71450d06247995f351d232756e17775a64529fe70926694d1be0f10b7ce4e1017c05722706c5ea44a23b9

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQVE:zCsanOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_657ff44e07cac7f8ccc38d33ce1739d5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections