General

  • Target

    2024-02-23_435b1aa63530f42252bfc272d56d46d1_cryptolocker

  • Size

    63KB

  • MD5

    435b1aa63530f42252bfc272d56d46d1

  • SHA1

    9d8bd41cbbf738e552742cbcae9b200d19830513

  • SHA256

    cb4a995e63305eb264531b9e7e80e4332ac6f1c1ba02d9aadfa4dbe02d12263d

  • SHA512

    1331485fb53debb58585f735e3162785b53b0ffa0a3e4ece43eff0c74ca5bba64f3fa994500b320bf4b24dd2f8f5e4529b2509c20e3f0b887431fd3a4e419dd9

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7hFlV:zj+soPSMOtEvwDpj4kpmeLmWX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_435b1aa63530f42252bfc272d56d46d1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections