General

  • Target

    2024-02-19_f340157464cd59b23b8fa51fecba8b4a_cryptolocker

  • Size

    116KB

  • MD5

    f340157464cd59b23b8fa51fecba8b4a

  • SHA1

    12cded3439a1c6e161fda3df3b34d87c0963ebb3

  • SHA256

    0ab31e977d6308a3aa6165956311e8a37b97a7b43997ca125ab5fc13f0ab9bab

  • SHA512

    c5eccef7f447633b3ae0ff97c339dbaa73d7c44b867453d626b62346c3a1ff55ca447dbddc8361e590e3ffba3778880d5f42475164afa1255b90bb96cd0c110a

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/cs:T6a+rdOOtEvwDpjLz6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_f340157464cd59b23b8fa51fecba8b4a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections