General

  • Target

    2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker

  • Size

    116KB

  • MD5

    114a1f7077efcfa2617065dec9243345

  • SHA1

    3c2bda1a673cd6ef2f31b0c677c8c8a33f16f600

  • SHA256

    4aa3dc51415c92869929aa600303e6e30726d5f8eedc213fcc8e1c47cd79833d

  • SHA512

    13d339f595bb4217007dcd4360a59ea69516bcdc658b5a4df2c61f0f863a8e35e48c952766b8517449477d265576c2cbb5d12577feb687ba46e1c118d00a64ab

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9P:T6a+rdOOtEvwDpjLzD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections