General

  • Target

    2024-02-21_443cba65c86fa7aa2d2ff6238ba3d2ca_cryptolocker

  • Size

    117KB

  • MD5

    443cba65c86fa7aa2d2ff6238ba3d2ca

  • SHA1

    dde500522caeed4515f703f98e87914c47cef6bd

  • SHA256

    0bb2a73b177677e5a2edf38580c5d23e6df7fa97c34646d81ef2209e56dd563d

  • SHA512

    2827efb968677a288dba9181d48e1912d94709ead23eb80d99dea28d17e11867a9364163e851042d295ee5f05958ed6a1d179c0081bb46d227ba5f0433bc544c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01t:z6a+CdOOtEvwDpjczP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_443cba65c86fa7aa2d2ff6238ba3d2ca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections