General

  • Target

    2024-02-19_436b86d1cb26c2688de4884f379c69fd_cryptolocker

  • Size

    61KB

  • MD5

    436b86d1cb26c2688de4884f379c69fd

  • SHA1

    d5eb4364e01ceaa68ad69a52389904f99df53a47

  • SHA256

    1d83a0d314c750dfaad28e45584a18074af1f38c47a3e19cfe653aabd30f2c6b

  • SHA512

    cf074870fb00fe88a37bcefcf2ae4775234a10c64599fc2f430edae595f46473f9cc1e39ea0afc043c10c562e0cf7bb53c0dd0e5a25eef760da3dd5b7555775b

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnV7:zj+soPSMOtEvwDpj4kpmeLmnR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_436b86d1cb26c2688de4884f379c69fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections