General

  • Target

    2024-02-19_4439911006a0c3fb8dba9f9fe7cc3f12_cryptolocker

  • Size

    107KB

  • MD5

    4439911006a0c3fb8dba9f9fe7cc3f12

  • SHA1

    a9d46156428f64fbc7d0381b4bbdb5aee264c57a

  • SHA256

    c41cf750ec46db5e481565941de03057beacb20a00d6c97e7476022a19a443cc

  • SHA512

    aabf8c27f71ee11bbcd4154bb05b497592b8a4db33d2b9fd64858dc87c799ef6809e537fc87948dceaf0b87d31c755d71fd92791aac0c307bacf50c96a7209df

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkszfJ:1nK6a+qdOOtEvwDpjN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_4439911006a0c3fb8dba9f9fe7cc3f12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections