General

  • Target

    2024-02-24_81f4c67b9b0f009825e30a9d7cb2e737_cryptolocker

  • Size

    65KB

  • MD5

    81f4c67b9b0f009825e30a9d7cb2e737

  • SHA1

    401b16dce66f44a8a306d315cb9b14b0f086c45c

  • SHA256

    70c1ca14b41461dd20a5f5dac0b41959f945e78cd6285f564fab6a6651a3afed

  • SHA512

    312a1fd6e29a0f9f9d9bff0a3e3e264ddc20a056c938e51df862c5be42f806d3d0196a0807fa021b5867ec98e5a645200e9a652a516deed60fb352fcf497f230

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1F1:T6a+rdOOtEvwDpjNV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_81f4c67b9b0f009825e30a9d7cb2e737_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections