General

  • Target

    2024-02-20_617d2f5e625d3caa70dfe5ef63f7ea3d_cryptolocker

  • Size

    110KB

  • MD5

    617d2f5e625d3caa70dfe5ef63f7ea3d

  • SHA1

    b0e802e942ccb7835686a94dd0ba4277a3ba9e9d

  • SHA256

    cc99cda9b5a1c143291ce16e51c87e92814841d7d1552a3351e8207c8a59a586

  • SHA512

    22cbb298f2f1f8f27577057cd532e65ce670e151a60d5c1052af980ea39101e3c50746a38954d925a925f1c5c97cf9a437fed62ce29b90adcc49cd4f712bf4d6

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwMgX:T6a+rdOOtEvwDpjLzj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_617d2f5e625d3caa70dfe5ef63f7ea3d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections