General

  • Target

    2024-03-08_66a4c8d23e00458ebdc140514d23dc9d_cryptolocker

  • Size

    64KB

  • MD5

    66a4c8d23e00458ebdc140514d23dc9d

  • SHA1

    08659d9ce209e14ce55650888ff17569391f7d27

  • SHA256

    0ccd9e424d002e87c2d00168b594a88f20c07bbf99c1bb0fd4744f5a5ae6ba56

  • SHA512

    1c73b3369291df0b817bf8a61e2fa2f515edc4fe8f064f6a3a4754cbb8dc4bf9ffdce6583332f910ff4ac46202562ab33ac7a28fbedbccaaf7f31cdffd1569f7

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo4:1nK6a+qdOOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_66a4c8d23e00458ebdc140514d23dc9d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections