General

  • Target

    2024-02-24_4172e199fba9e328c6821796c6e32112_cryptolocker

  • Size

    115KB

  • MD5

    4172e199fba9e328c6821796c6e32112

  • SHA1

    7f16473bc688e83e9a519ccae2bba0f6fcb53838

  • SHA256

    cdb0017ddc821abc5dbae35a865e865a651f6f8a982645952a2e0449ddefc96f

  • SHA512

    30f8f84ced5e18f09e182e03aa2393d0cafd8ab3d21c55259b09a20f684ee7eed734a5b6200cf2b119436aa8ce53bd3774efcc91683ed28fef9c6486d55287c9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9hq:T6a+rdOOtEvwDpjLzE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_4172e199fba9e328c6821796c6e32112_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections