General

  • Target

    2024-02-23_41b3333c01909a839f876ee72fd65079_cryptolocker

  • Size

    57KB

  • MD5

    41b3333c01909a839f876ee72fd65079

  • SHA1

    97577bfa54cb77f33d282771f6984c4c551031da

  • SHA256

    71a93ce224db572e1e54d29bc81f5191bab08f4cb286c523a9827df78bcc6e08

  • SHA512

    176adcf1ad3db0b91707495dcea5ab90ec8a6b0cc955bde926235f1546357c9c1f8df9661aa34824843ac8453a5ef02ddbeef18381d20e7014e5d17c6aa7cc8b

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appRRG:z6QFElP6n+gKmddpMOtEvwDpj9aYa3G

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_41b3333c01909a839f876ee72fd65079_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections