General

  • Target

    2024-02-23_531a111ffe42cd78898b2c191ae3d9c1_cryptolocker

  • Size

    88KB

  • MD5

    531a111ffe42cd78898b2c191ae3d9c1

  • SHA1

    613210d79f2085a854d356e5317d0871c430cb9a

  • SHA256

    ac1b870e30f37b27f15f2581cbb4ce58e95498a5afae744ce519675513f8d133

  • SHA512

    9e79ea757319bf581f8e3e32e71d0e8318e027c29ae284cfdd2a108312e11aadb89a2ddc71d1108f1af9c01d42b0d1702ebd4a7fb77e52744b917a99413ac387

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjX:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_531a111ffe42cd78898b2c191ae3d9c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections