General

  • Target

    2024-02-23_d088375a7603f36952a0d89d1256f930_cryptolocker

  • Size

    66KB

  • MD5

    d088375a7603f36952a0d89d1256f930

  • SHA1

    04aaca814583159b258933ee9f9d2ba34e94fba0

  • SHA256

    c5198d1643d428896936f86064901bf30d680e550a78dcb2ec842bcf1d19cd9c

  • SHA512

    0912ee89f2bc6f82ff89d1bac72001d89d8e2fa8aa0cfafa32b902b6178c6fb47eea79e086b52b895a3407660a918372e7c6e20a2c64db8afb8cef2dc35cfc04

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UncE:1nK6a+qdOOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_d088375a7603f36952a0d89d1256f930_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections