General

  • Target

    2024-02-23_35bfe7b492b72f34ab93951385a0b7c8_cryptolocker

  • Size

    57KB

  • MD5

    35bfe7b492b72f34ab93951385a0b7c8

  • SHA1

    f46fb982b5886d40cd75b076e946dfe71a52aeb2

  • SHA256

    91570e56f814365a1ccf25cd70b0fd88b1a6f0ab5fc8bf2886016a495193e1cb

  • SHA512

    9c2ffec546eac58d246ba9bd1b12028e5f5e9ceb8143d32f1724dd75e8fed150cc3b6156f1ee2436d17488464e86e37842ca94bedef619a725488de11bcb1af3

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLzbC:zj+soPSMOtEvwDpj4yzbC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_35bfe7b492b72f34ab93951385a0b7c8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections