General

  • Target

    2024-02-20_3455f853bd457e8c7e1f46e922e296b7_cryptolocker

  • Size

    82KB

  • MD5

    3455f853bd457e8c7e1f46e922e296b7

  • SHA1

    209083c287afd0f0d55bd8886d5026bb602a462c

  • SHA256

    92ba52f9a50dd67d276f966a93aa0295db7445b475056947602d9106d432c8c6

  • SHA512

    91fc2cb1ba0c7067525be7557817c539dfe85eac0cbd1cc7a4c3d3d40ea3c89da84f64a1feebd296c09cb0e99b99f53f758eef13fec32b1e6be69b6fbeead52f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7ED:T6a+rdOOtEvwDpjNa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_3455f853bd457e8c7e1f46e922e296b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections