General

  • Target

    2024-03-18_23d04ef4900450de699b92db662452ff_cryptolocker

  • Size

    66KB

  • MD5

    23d04ef4900450de699b92db662452ff

  • SHA1

    8402afb1e8a706bf556a85f4cf969ec8ef39e5d0

  • SHA256

    6b1ec7961593c74e9ad40baf00355b243193ef6a6d779677c1a15b6be10a86c7

  • SHA512

    33da6ef42f7eb48b0de883bca690996744396494654007ac50ae8cfb0dbc4f6e20ba36b76552926e3594387424d1349163a60419886b2761b9077dbe83b4a1d7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1FU:T6a+rdOOtEvwDpjN0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_23d04ef4900450de699b92db662452ff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections