General

  • Target

    2024-02-20_a0d14e9104898102550c7fdaa8f56c49_cryptolocker

  • Size

    77KB

  • MD5

    a0d14e9104898102550c7fdaa8f56c49

  • SHA1

    a5d40d1ec65ea831575204fcf5eeb18edee9dd88

  • SHA256

    75124556bdc9d85e227d1d412936487a527eff2aba3f781d634834a088aef0d3

  • SHA512

    f827f4d8c4d2baa9b1150fe4226d9c63e45a4a21d6c8ae95b6f0d50cd550610f184ef7eb80803485283e5481d6dd0c0d24ec61ecd715b8abe6da46559d816190

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QL:zCsanOtEvwDpjf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_a0d14e9104898102550c7fdaa8f56c49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections