General

  • Target

    2024-02-23_462e837635dcb1872a6eabcb2359fa81_cryptolocker

  • Size

    62KB

  • MD5

    462e837635dcb1872a6eabcb2359fa81

  • SHA1

    999f58a0c45ecb4f36235c8839d9bff36d3bf179

  • SHA256

    a0b21448f1341d0ff40e29b441da439ff59af9a88d3cc34d02ce650fa320c357

  • SHA512

    e7cdaea12716a917c1753fbded3bc8d8a9f3128a666ad0aa7b42156595e9a5b9aa9eca26227e7156592e8fe439cd0f6bdb6fafe5be54b048b63ada367bf712f7

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVgb:zj+soPSMOtEvwDpj4kpmeLmnK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_462e837635dcb1872a6eabcb2359fa81_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections