General

  • Target

    2024-02-18_cdd9f7e4b81395f2a94d0cb8f41fc2cc_cryptolocker

  • Size

    81KB

  • MD5

    cdd9f7e4b81395f2a94d0cb8f41fc2cc

  • SHA1

    042985b5bd2a7c75cfb59f8da5e709965626d0ed

  • SHA256

    336b51351e40b264f30aa26255885c08e5bd084cb8d2e79d82abbffbcd7b78bf

  • SHA512

    c852a669f8e10179f2eb9296727d6a1a8ee6965d587d627209ac2ba4ed726cab4d28f466bbfbefec5d67fda9fbd4535156da0dd8c5ebc4611c6c6948b4f27e6e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdeSc:T6a+rdOOtEvwDpjNtI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_cdd9f7e4b81395f2a94d0cb8f41fc2cc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections