General

  • Target

    2024-02-20_066351765d69efff1652ca0bc03968e0_cryptolocker

  • Size

    105KB

  • MD5

    066351765d69efff1652ca0bc03968e0

  • SHA1

    2ba7faf4c83319ee1e5ebfed6203535e46e38536

  • SHA256

    c5a30aa6f74b635a093cda463a74bec3d6a7467a4e448a9081feae6c8f689862

  • SHA512

    55f8454e71a3279bcb53d2bacc7e521f24eadd6e0872d77ec40632ef4286e5f1bd217af9e56cfebb11d93b9fc07c36907921e38c6979f46af887e7da265fbedf

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksueey:1nK6a+qdOOtEvwDpjt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_066351765d69efff1652ca0bc03968e0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections