General

  • Target

    2024-03-12_214d5045bab4ff336bfe1c58eb441b25_cryptolocker

  • Size

    115KB

  • MD5

    214d5045bab4ff336bfe1c58eb441b25

  • SHA1

    21b35470348446a73e1cf5cbc054bbcd1b71bc73

  • SHA256

    df31c1e73748d6e4c1c7f882519fee2d6fd12c3a98ce1aa81245a7eefbf3626a

  • SHA512

    45048bfe1c07b207ac41509a7b32ffc8b28f9888fe1826e055da7e89d9075a8bf73b442a2552e31bcce2afdf132e0770bc82d47b8bc5cc18c41e53024fdb3440

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp0QVON:z6a+CdOOtEvwDpjczh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_214d5045bab4ff336bfe1c58eb441b25_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections