General

  • Target

    2024-02-23_c117ac7f6c0a8fc48bd086f1480a13d2_cryptolocker

  • Size

    56KB

  • MD5

    c117ac7f6c0a8fc48bd086f1480a13d2

  • SHA1

    5e949df05ff30673033eef40d8deca672b44b2b6

  • SHA256

    9298e31519fa4f208c51cdb56ca2058c99e15c3410da74dbfce7e2082f059492

  • SHA512

    82fc6d34861f699d77c3172351e2b6077889d9c4cd2dc650d8677776255bff764a04c2664d670627e95afb0ec35ef788383e81f7c5cfe646382c81f7bb70be48

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axcj:z6QFElP6n+gKmddpMOtEvwDpj9aYay

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_c117ac7f6c0a8fc48bd086f1480a13d2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections