General

  • Target

    2024-02-21_993715199dea8c46d2f2e8156cbb3a11_cryptolocker

  • Size

    63KB

  • MD5

    993715199dea8c46d2f2e8156cbb3a11

  • SHA1

    d998cc4f2a05da43b84fbd6e4de20e473725bc79

  • SHA256

    aa4dd19e16e357678d3e8ce9b092b2cd499745d4fce276e3f7b6525345d5c352

  • SHA512

    718b8765f2667fd747daed2c7df05421d2d97cb777fc065a2f59143c96fc54082dbcce455593d23e251f0f16a71ada80860b26ce43a9922b9dbdfc0110834092

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAofC:1nK6a+qdOOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_993715199dea8c46d2f2e8156cbb3a11_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections