General

  • Target

    2024-02-20_375e45b54b1db2ce4c936fd4632f68ff_cryptolocker

  • Size

    60KB

  • MD5

    375e45b54b1db2ce4c936fd4632f68ff

  • SHA1

    e3a98d996e80489426d1e25022ffdceb855ef7a5

  • SHA256

    40b931d17836cd6e4cec91fd3689b5ae660c402748fd6ed42cf9130a2364edf4

  • SHA512

    e2426e0aac5ad8a83cf9b4bc6b095fcab59689a1b79db17490ae2e5ddd86ecd1c0c51b14e0afbbf7ba7924eabc5e014beaf5a076e23ee5b6bafa8b50355e5e9e

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVR:zj+soPSMOtEvwDpj4kpmeLmn7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_375e45b54b1db2ce4c936fd4632f68ff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections