General

  • Target

    2024-02-24_2a4756a0542a88697674c3a5e7b1809c_cryptolocker

  • Size

    80KB

  • MD5

    2a4756a0542a88697674c3a5e7b1809c

  • SHA1

    a525a5bd0af96413797c9c2d3782f0ec9f1e0755

  • SHA256

    6c9a7a103d6ff3115b6c292300626ee563ebadca34f9661075a1d15d278a85bc

  • SHA512

    0ecab74f552b6123a2e6e17a62ae8639c36d27e95a4ea55d9ec06f9612854c602fdb900c0cd307c7f5afa59f07812f24fea25e6f6c50cf717d52c31b41e5111c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2Q:zCsanOtEvwDpjG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_2a4756a0542a88697674c3a5e7b1809c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections