General

  • Target

    2024-02-29_5fdc190c96a10bea92303cccc9d1c623_cryptolocker

  • Size

    80KB

  • MD5

    5fdc190c96a10bea92303cccc9d1c623

  • SHA1

    ccfc72cce67cd8d666a6c12a11b7c3ecc2863f1a

  • SHA256

    f6c20c46e2f9827d8c65f538194e04722bad6c10966b8d54bf7f06b96d4060b0

  • SHA512

    2d3a2f7131843d2c962f129cbf93b9f0887ecb3a41779f69e95b1f5b05b6a2104a7ad9dc536dc1adab803acf585315f57947f5c7d6187f85b4be320c5b2cd7cf

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kySeQ:zCsanOtEvwDpjL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_5fdc190c96a10bea92303cccc9d1c623_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections