General

  • Target

    2024-03-13_4d194a5643d91d6e04db967e99a6d08f_cryptolocker

  • Size

    80KB

  • MD5

    4d194a5643d91d6e04db967e99a6d08f

  • SHA1

    53d2b40b85b1e04b4179dc84b3be3a9bc5ce52e4

  • SHA256

    98a582f47566f5c685d024423f1860ebc48f1d082e53c7fc9d7ab6e8dba25652

  • SHA512

    19fc2f45bed1d32726315b60c6eaf483e6191d91c5b5bf9bac5fc40a6bac2acd513ea81f64e84c825fc908156bf078c14e9a689e724695e427b1295de44a793d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyS2zZV:zCsanOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_4d194a5643d91d6e04db967e99a6d08f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections