General

  • Target

    2024-02-29_20398814594d0a6d2117cc51fe6203fc_cryptolocker

  • Size

    117KB

  • MD5

    20398814594d0a6d2117cc51fe6203fc

  • SHA1

    ca55118ddba5a87a7fadaf04f71b7dba1a2c74c2

  • SHA256

    b171a94245e12a82fc8f6f6c6a97b36c2c93de97e0d657f0332af2a3944860f9

  • SHA512

    2587ca97a705d5bf5b1af8d5ce5b96bf636b110e0f20db5c0de730c7c80d86e4faf9f74b7da0fd3cff59a146f308e381a42fb27c077fc883a3c5f173c56893cf

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01ZN1:z6a+CdOOtEvwDpjczD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_20398814594d0a6d2117cc51fe6203fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections