General

  • Target

    2024-02-23_4eceb57457527820f6567368ec7aca78_cryptolocker

  • Size

    117KB

  • MD5

    4eceb57457527820f6567368ec7aca78

  • SHA1

    8b6c3d5a7e066e1ab31c9aa6aaa7cb7d0c2c0362

  • SHA256

    a4527d7c54fa07e1f2f1f18ad8776a4b92ecbfc51e4838e4f7e7066305d87f89

  • SHA512

    7a65cfdba0f58fd7ff9a334c9a381dfb4acdbf4e10ad847aba87511449a7aeea60665e83d333ef36ac89ce44e5b98d46d4b2e37428f62868c454fc6b0ff408b8

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Zl:z6a+CdOOtEvwDpjcz5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_4eceb57457527820f6567368ec7aca78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections