General

  • Target

    2024-02-24_563d91f9be07ceae169d07e6b17ae7a4_cryptolocker

  • Size

    97KB

  • MD5

    563d91f9be07ceae169d07e6b17ae7a4

  • SHA1

    29689fce014c2049d6da95326e11f96ffd2e69a0

  • SHA256

    3d45179fe61c5ada3791facffbe62cfa810b5bf333e6373853f3e6f4a8bf9a4f

  • SHA512

    8714047e15c24666b782b1e85544e4ae07cc23c3ead4f7ac30cb42643bf2191a39980184a4f8ec06a7cd9b47a66669d7bc8091dcc01d9896ba91b7b9c91615ad

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiH:z6a+CdOOtEvwDpjcz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_563d91f9be07ceae169d07e6b17ae7a4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections