General

  • Target

    2024-02-28_4e623230fa0bac8197aed39143636f0d_cryptolocker

  • Size

    68KB

  • MD5

    4e623230fa0bac8197aed39143636f0d

  • SHA1

    3c5c5f8450d3e6ed8cd3f6618289e101601535e2

  • SHA256

    05737b4a4b92716c1a4fb9c3af95890c54fd1d325ada69397c7c51636914f119

  • SHA512

    c8a186f92913aac77aaf908900423fa58e07b7a937e3cad482db981a90d56cc5d1bbbecfdcef71025754152351eb391b1f7da30d5ad1b0ff9ae75bcc6b507650

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBj:z6a+CdOOtEvwDpjQR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_4e623230fa0bac8197aed39143636f0d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections