General

  • Target

    2024-02-20_803422ebe0e8612b67e1a7b89c2d3a88_cryptolocker

  • Size

    65KB

  • MD5

    803422ebe0e8612b67e1a7b89c2d3a88

  • SHA1

    35db613a5e12a939e8c98a2a88513c393d22ca8c

  • SHA256

    df75e6b2d8b5721a160338f3cfe3f9b7620ff1c0818d6ad2dfd8da9c2c8c834c

  • SHA512

    718d7bf4f0d5085992ea3c2f3b67ee9105e93bda016baeee1463c851f3fb48128559fa3396c6d6c8269b8eae04352192ece461174c87fea6560eba63f2e4e735

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6U7r:1nK6a+qdOOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_803422ebe0e8612b67e1a7b89c2d3a88_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections