General

  • Target

    2024-02-21_4ef7d08368fe498fb34ea682cca4c862_cryptolocker

  • Size

    106KB

  • MD5

    4ef7d08368fe498fb34ea682cca4c862

  • SHA1

    208244c896e0e9b5596b6a0fc17409a41885a689

  • SHA256

    1038ae5acafeea27f3db6a15f836e1bce48f5fb174d359a488d451ae55b87e2c

  • SHA512

    abe625e2f87dbf4d6d420a6a3c1ae5d230403815df09c0bc37a007808ea67c6144f58a89c84d490cb848170ecdeb7d25c6e8c6c60414f8f7ebb5652491c27f3d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfav:1nK6a+qdOOtEvwDpjU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_4ef7d08368fe498fb34ea682cca4c862_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections