General

  • Target

    2024-02-24_d417d5954f42789752e1b4251131fc38_cryptolocker

  • Size

    120KB

  • MD5

    d417d5954f42789752e1b4251131fc38

  • SHA1

    d0d2ef5405b06eaa79f67124ab4fd263487bd2a1

  • SHA256

    cc990f46ef2d90d843996c285dd872d27219e86d46471ff52351175423077bd0

  • SHA512

    3f1a5463b6dbf1524bb13d4f47c5094ed52789fe55b78ca4aad29662842cca0f6272fca19f4753ccc7e0e7b3bb97c8c5d5c2dd4e12898a189383da715a416004

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t3Q:z6a+CdOOtEvwDpjczt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_d417d5954f42789752e1b4251131fc38_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections