General

  • Target

    2024-02-29_631a305c1aa5b6bcaf85077d6bb54a38_cryptolocker

  • Size

    64KB

  • MD5

    631a305c1aa5b6bcaf85077d6bb54a38

  • SHA1

    025feb673079e9046c2e5d7afe8617d160650de2

  • SHA256

    e628cf7b458847388f7f96a460a0ab4080654c78bc4c65444f63c891c7d53e20

  • SHA512

    de52a63a028f3ee76de9f6d176d335976e9adc89751232e4b8386123c0695ec36b1e848128ca5678b9b04e30dcdc57302ff991d862129dd20d2634aa9580966e

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoR:1nK6a+qdOOtEvwDpjf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_631a305c1aa5b6bcaf85077d6bb54a38_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections