General

  • Target

    2024-02-22_1d489a08a39bc5aa9a57a88bce2a724b_cryptolocker

  • Size

    91KB

  • MD5

    1d489a08a39bc5aa9a57a88bce2a724b

  • SHA1

    344d4d6f5d06c176a61b70ac8aba797dd819e874

  • SHA256

    f80a0b6d6929eb343d3245b75d27b2d35318eca8a5ebe9bd8efb44d82875d464

  • SHA512

    5360dfd33891ae82c3841373ca37ec931a8d44acc996e4f79181ed01ce4dedb34649c6d2407cbdff95807aa0c02461ef3a9b6115b1b9588f241ea4a2dac047fa

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87UvTb:zCsanOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_1d489a08a39bc5aa9a57a88bce2a724b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections