General

  • Target

    2024-02-24_97d423bfc5d26687fd06f11c68eb3147_cryptolocker

  • Size

    117KB

  • MD5

    97d423bfc5d26687fd06f11c68eb3147

  • SHA1

    0c03e5529c89b50839f15e8a6274bc989bc8df5b

  • SHA256

    6397b07471490f59607f2679626dba6561753e93eb263c69a3b17a30ae2f8adb

  • SHA512

    06bb65d6f1c592fc7d84bc3a114004244c1be7e2be833937904417104ccd68dff530c38dbbeb4815e834e44aa518dbe4e7e7fd0dbaa2f225f8905a5c40bb55f3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01QaA:z6a+CdOOtEvwDpjczW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_97d423bfc5d26687fd06f11c68eb3147_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections