General

  • Target

    2024-02-25_941dc697b9db4b2ccb7dc7bb2a984e44_cryptolocker

  • Size

    70KB

  • MD5

    941dc697b9db4b2ccb7dc7bb2a984e44

  • SHA1

    ac310bbb7435e00ebe92b7acf910da9db214480c

  • SHA256

    bb7a34388d4456b1365c5d66b0258edaabd454b247e73e11a05095db53f35c74

  • SHA512

    da3b541dc923845d0307e564019202a2f77ffc7db7bd600e7e876aae1583f615f27098ad8641bcc579fb6097305cd19d39c3293ee5af034f10e964dbff767277

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBL:z6a+CdOOtEvwDpjQp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_941dc697b9db4b2ccb7dc7bb2a984e44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections