General

  • Target

    2024-02-28_4fd65eedbd4c82ebbf7cca59a68c0af8_cryptolocker

  • Size

    87KB

  • MD5

    4fd65eedbd4c82ebbf7cca59a68c0af8

  • SHA1

    da10c429e59915ff136ed0a6cf4ba407575289b8

  • SHA256

    0e02a28ed8a8246457081ed5c9351b5c7ae69bbc040b3a93c829676bac7ec650

  • SHA512

    d90f77bd63c130a7abd31c4f0b2cef6f194952a700a2a5519e91b2b827a84f484fad03c4e5f9588d88364ed6f42294382daf10b7261040e3bd3faf46dd93ef70

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tybq:zCsanOtEvwDpjb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_4fd65eedbd4c82ebbf7cca59a68c0af8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections