General

  • Target

    2024-02-22_681dd6223e9d809acdc73c1c5f50d6cd_cryptolocker

  • Size

    58KB

  • MD5

    681dd6223e9d809acdc73c1c5f50d6cd

  • SHA1

    dc25ba9651f913736cd1c11679d3a4b8847a33a9

  • SHA256

    cd852f885bcf5b7c784c2cbeeafb0611d9110c533f391773303eb3bf3f7f769c

  • SHA512

    0ecb92760a11c8cc432c2019d2888b1abfb32ae849ff487233f2487543fdac6ff1f235a65c448973db1fb9cdd3b47851da2a011086e20abe179cd37edf507f02

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appOq0rS:z6QFElP6n+gKmddpMOtEvwDpj9aYalp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_681dd6223e9d809acdc73c1c5f50d6cd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections