General

  • Target

    2024-02-23_0069e935c471146398e4e678643b4483_cryptolocker

  • Size

    105KB

  • MD5

    0069e935c471146398e4e678643b4483

  • SHA1

    8f490b13dcdf0012ce26f48808d71212c28e51fd

  • SHA256

    c3a717ed1efc513d20a721658a15e732db972e145f2ef0ff3b5f59b186ecbbd3

  • SHA512

    2d7a7588ef3df4fe252f9ee18b6f6e58abbe855c963f6d66efc8717ffa3675f8ed66fdc52c33b523ba38119c47600f50d33ebcbd4f277956a6a8455d18e0f467

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksur/:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_0069e935c471146398e4e678643b4483_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections