General

  • Target

    2024-02-22_a5c5f7ec41f1a0f03488a86b0b22fe57_cryptolocker

  • Size

    61KB

  • MD5

    a5c5f7ec41f1a0f03488a86b0b22fe57

  • SHA1

    0231180575c2db576e69669fd8fc7bdb06a7c43e

  • SHA256

    5052f42a87f419df1ad8816e1790a93ecd56345d51ccb5bbf4831909be8d9248

  • SHA512

    15f45bda66ed01adfa8e135055c1aa89b64e5588feacf1f105c6eca8197f88e5d0cbce87da13c18f6f418a50f7b96fd316faf3c7c5f50b777e523f72f03a9d70

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVuf:zj+soPSMOtEvwDpj4kpmeLmncf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_a5c5f7ec41f1a0f03488a86b0b22fe57_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections