General

  • Target

    2024-02-21_952a121f422bc281b93f7dc34fb2d731_cryptolocker

  • Size

    65KB

  • MD5

    952a121f422bc281b93f7dc34fb2d731

  • SHA1

    28479399e67d7742e5bb46da639680b241fffe22

  • SHA256

    50bc4a753bde1ac360ad6a078bd5d786b5a36c4c50b1526bcae77c214a6b3d01

  • SHA512

    c990713989c0e8239f65082e4efd5670de5ccdfb85a0d2db11799c313e99f06d5a4710db910481216d875a86b03df306a8c9bf941dea604c0dc0a95d4718c9c4

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXa4:1nK6a+qdOOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_952a121f422bc281b93f7dc34fb2d731_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections