General

  • Target

    2024-02-25_a4ba2b6bc36cfac3ee73fc3a244959e5_cryptolocker

  • Size

    64KB

  • MD5

    a4ba2b6bc36cfac3ee73fc3a244959e5

  • SHA1

    1f9afe1d750510efec20afda7ead5b94b02bd7ba

  • SHA256

    c2df88ca1be207d5c5975f84782a9e8c74d57685347a744bde9c271c604d97c5

  • SHA512

    037656d55d81ef4a0f546e8fd5380e959ee630068d43b96677b4d6189501e7ff32489e364f2b2f788b0b678947c0cfc4994339323e3cfea1a5aed4bddba042d5

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Ud:1nK6a+qdOOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_a4ba2b6bc36cfac3ee73fc3a244959e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections