General

  • Target

    2024-02-20_203a1353592d7c55997a65b3d37ecb94_cryptolocker

  • Size

    63KB

  • MD5

    203a1353592d7c55997a65b3d37ecb94

  • SHA1

    b400395f2d1e9d99274b4a876a48c8a4c2d0aa66

  • SHA256

    4d4094b76a299d8b06029834ccf0b14c3f695bc015d6c0c5a99ba8344557de78

  • SHA512

    8711eec72d4a792760b2c1951ae246b61911c38557edd3f36b0e5b5f457a7a0bf3fa69037b9de49b6c1816139f062c2904fb9e7b1724a95a60ed74d98f78429c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAofF:1nK6a+qdOOtEvwDpjj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_203a1353592d7c55997a65b3d37ecb94_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections