General

  • Target

    2024-02-22_a42c1522d19251234b98f2c9ed90f9c9_cryptolocker

  • Size

    105KB

  • MD5

    a42c1522d19251234b98f2c9ed90f9c9

  • SHA1

    6b65cc2bf3a4161f3261f606ab4179f6bb7081e3

  • SHA256

    f1bdb4b2c047ea616b5ef5338b535ffc1f507f0abf8f36244039fda87da2991c

  • SHA512

    3b9fc9097a48021b16e017b6eaa5a5d879a03fcfad0a76bd01f868f9a88c36f3b999c534072f69b0cbae88ae95ec85d2db3618460bf35cb0d3e661338c63dd99

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaF:1nK6a+qdOOtEvwDpjE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_a42c1522d19251234b98f2c9ed90f9c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections