General

  • Target

    2024-02-22_51425674b4638975ef6fa82c1c4d5390_cryptolocker

  • Size

    113KB

  • MD5

    51425674b4638975ef6fa82c1c4d5390

  • SHA1

    ea92bfb154aafe1051c94b5c2dcc686599c29ae4

  • SHA256

    9b1614ae953853382792c292a66ae141b125428d11a1846119035432e4530767

  • SHA512

    a526942f05d55b692052b5f4ea5c82b67dd8ae3c72e9d1f16e532353ba5782bf1ba028973152d4a22d7ff3c22446fe55d255270ab2a56db0755a860542721341

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp0E:z6a+CdOOtEvwDpjczs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_51425674b4638975ef6fa82c1c4d5390_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections