General

  • Target

    2024-03-11_23e380665349d6f40ab6d19a3c50173a_cryptolocker

  • Size

    76KB

  • MD5

    23e380665349d6f40ab6d19a3c50173a

  • SHA1

    ccd064f797c3e66f2152bb97014af3894922ade6

  • SHA256

    9936910361ebef4e16a40c148794bec32c52e9ba9907a9b462eddd455b7d89df

  • SHA512

    e89c95b3bd065187ca9571ae3fd2cb2c583a32192a64266d1a30f03cc4a483f718e543f56e7bba149c896bc4ffe2bc325a5daace0ccb87bb3664c3d079f2e469

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxd:T6a+rdOOtEvwDpjNtHP2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_23e380665349d6f40ab6d19a3c50173a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections