General

  • Target

    2024-02-23_92cdacb65573d0d0d1e5e99f199b469d_cryptolocker

  • Size

    97KB

  • MD5

    92cdacb65573d0d0d1e5e99f199b469d

  • SHA1

    793d05f8e7f8883f4085ee4cd67e9543033ad916

  • SHA256

    5a9fb9dffa94ff113a7aed89d07273edc994cf5470f6674d276f241ca0ab6862

  • SHA512

    f56162803bc1484a4a65a23b85e77601db05515ff87988f20a46f52d32769d1e2108bb69d5953e124ff73bb8620d11fc895de250a3fbc2312bc47a050d2b4a70

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiK:z6a+CdOOtEvwDpjcW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_92cdacb65573d0d0d1e5e99f199b469d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections