General

  • Target

    2024-02-29_0d0c04c420378cea4b1e5b6f75f37e64_cryptolocker

  • Size

    55KB

  • MD5

    0d0c04c420378cea4b1e5b6f75f37e64

  • SHA1

    2c6f8112c24d659c9bdf09d4fb14b4fa1b9e88f3

  • SHA256

    788ed4691317c419f5d662e2d3fac920b0b89a06fa24b7d42760bfb07fd2b765

  • SHA512

    383742acca574a9515eda39b2d3ae5a72c73ae868563d079039e6bd3c9d89d03ad4e47bb2a3c5ff8ceb46eaf1adc82135f4bda9e993dff115eb84044185ac20d

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axr:z6QFElP6n+gKmddpMOtEvwDpj9aYat

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_0d0c04c420378cea4b1e5b6f75f37e64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections