General

  • Target

    2024-02-23_0d407656f6802e8b67373218b9d39ac8_cryptolocker

  • Size

    66KB

  • MD5

    0d407656f6802e8b67373218b9d39ac8

  • SHA1

    a764e3b6f2a03be74099217829dd5a0c199ef191

  • SHA256

    4302ebbdd2f93c4319b26c455f7474070a7196f76dbdcdeafee45c361f743375

  • SHA512

    99f666ed2f444190e1d236144e5b0b5883bf29587f7829f77d95bb1538cd28fef35eef74ebea6b3901cce95ec6a2ec839dd7412fe885dacd2ce8bd6622e83c90

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UX:1nK6a+qdOOtEvwDpj+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_0d407656f6802e8b67373218b9d39ac8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections