General

  • Target

    2024-02-22_a4814f4a0ae4d324f95a67ff1c5083a4_cryptolocker

  • Size

    56KB

  • MD5

    a4814f4a0ae4d324f95a67ff1c5083a4

  • SHA1

    b4d58b7f18de6d83c9b182d739d94c6e074dc379

  • SHA256

    55ea4318aaade9a4c9ad8c17e1daa222923f0f4e99375fede2c9272367ca011c

  • SHA512

    67f3dc79a98fb705eadb7f913ece8ab82e89a72c9256708800491df94eed29626ff8d5166d3773794d247a191d6cf03292e279b4025c94035456008bbf8c759c

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appv:z6QFElP6n+gKmddpMOtEvwDpj9aYaf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_a4814f4a0ae4d324f95a67ff1c5083a4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections