General

  • Target

    2024-02-23_923dd3333e7c624edea35059fdadae85_cryptolocker

  • Size

    77KB

  • MD5

    923dd3333e7c624edea35059fdadae85

  • SHA1

    1853c98a21e119ae9b3567615a4fd5239a265240

  • SHA256

    6d8659b434f826ff27c2c251b3f31e2a7a9b19b68055bfb7c4f040e46bdb89ad

  • SHA512

    a1298187f69d154910a2c32b2ac18934500e0185bf2844c2a2971039e5b94babf7d7824da9cfa6d7b7127acf3fb2681c0052b38b7163f80e326b9a606859f419

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuX:T6a+rdOOtEvwDpjNc9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_923dd3333e7c624edea35059fdadae85_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections