General

  • Target

    2024-02-19_a1fdd20de27582ac62dc90d4a92f42f9_cryptolocker

  • Size

    113KB

  • MD5

    a1fdd20de27582ac62dc90d4a92f42f9

  • SHA1

    b42c3cda741e887ffa6a77064ed2dcd881f9a2b5

  • SHA256

    54f0303e9f09297e619ae328f401c10d1917e10113d347fe6ad4dde4404c264e

  • SHA512

    fb7e0662d8d552bf91612ba797db3ec8cab34dbbfa8d5c9bc1c003e75e15b4ddfd0f873430d1313b8d5c1e0e47800093b81f9468abd01683aa46b104275439e3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwbCR:z6a+CdOOtEvwDpjczw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_a1fdd20de27582ac62dc90d4a92f42f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections