General

  • Target

    2024-02-20_c86843e0e328758f17bbb88e3071fee0_cryptolocker

  • Size

    63KB

  • MD5

    c86843e0e328758f17bbb88e3071fee0

  • SHA1

    c4b7e4fb0af76541d84a9da0a9a9a87b09330fc2

  • SHA256

    cc1db252c66560463ab6107cca67ffa8bb97c284d7538127ab12c5ef40fcbc15

  • SHA512

    11a1c4c505809e45fae74d1c99598065d1fa6c2f842b17a98cdc76725b664bcc0972eab9d278860f7aa221512acec16ebd9ed0646440edd045a0507ee95801e9

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7hFlR:zj+soPSMOtEvwDpj4kpmeLmWz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_c86843e0e328758f17bbb88e3071fee0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections