General

  • Target

    2024-03-12_d4b8900500dee3b6ed5f1d7d7d88222e_cryptolocker

  • Size

    105KB

  • MD5

    d4b8900500dee3b6ed5f1d7d7d88222e

  • SHA1

    d01a44b2e1b0be2801cd132da02a4f571c7ce5f6

  • SHA256

    2d50526c7a5076dacfcdef72841813f827e2bc2a7ae005680f2dc172a1dbce01

  • SHA512

    176a2c017b4af930b2ca190e40a78a912c949e14c655631f662b1f84fec1a3da820b1f690f5970d7783a24353970c74a14a84ecbb86055fd0eb66a04036cb407

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksY:1nK6a+qdOOtEvwDpjY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_d4b8900500dee3b6ed5f1d7d7d88222e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections