General

  • Target

    2024-02-23_a50ae1d7490c6c3a896100d8f3fc229b_cryptolocker

  • Size

    119KB

  • MD5

    a50ae1d7490c6c3a896100d8f3fc229b

  • SHA1

    6cbc8776fd7f6b0bd8c0703aba58693d46b736ce

  • SHA256

    fcf8ac59ddde6cbad84b9ee19b86998fb82f72a49be2e0830648e453ce0188af

  • SHA512

    79761d3204febb67296ebcae9f09fa33785dcb1ba518aad29f7aba8ef89add0cb67dfe41852b419f1275f6a1a8990b50f35a3ffb9370cd455b8be64b06f868b8

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01QaGUx:z6a+CdOOtEvwDpjczL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_a50ae1d7490c6c3a896100d8f3fc229b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections