General

  • Target

    2024-02-20_0534a0930616bd9e4bc94e9933b7bc5b_cryptolocker

  • Size

    117KB

  • MD5

    0534a0930616bd9e4bc94e9933b7bc5b

  • SHA1

    3e086281b1141fac08b49d4e7f98e6c0b795ce14

  • SHA256

    d21fba7ded60e15d0011ada85fd07f66c4e4415892f3385adc801a7b85c78a8d

  • SHA512

    e5d919d94a8a23bdb52ba67b84cf418db365da3a47a7a5751f504b17a5d48b1ea826eb4590b2bef446234ce4d15ad17fd76d5a7662c8090bad2ab6ec1111b0b5

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01kQe:z6a+CdOOtEvwDpjczS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_0534a0930616bd9e4bc94e9933b7bc5b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections