General

  • Target

    2024-02-18_943ee2fd977aed5d04632c0f70bb732e_cryptolocker

  • Size

    92KB

  • MD5

    943ee2fd977aed5d04632c0f70bb732e

  • SHA1

    7ac78f9d5f7fb8a691a68686210894efda01fd85

  • SHA256

    616e76c35ba26ed0bc29290b6f07b0620ca4baeec756f8eae135035c034ac37d

  • SHA512

    3df8076d9b64415d6f1ea80868503f4bec9b1ac17e7785d443912d0515eb5314f67fe61accf959ce13af3774fd6abd2e2c73e1e51cbbc66f10701574d2938018

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/z:zCsanOtEvwDpjBz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_943ee2fd977aed5d04632c0f70bb732e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections