General

  • Target

    2024-03-19_40e65f26ff30b307f92c604bb7275282_cryptolocker

  • Size

    77KB

  • MD5

    40e65f26ff30b307f92c604bb7275282

  • SHA1

    c490f45d71ce628e9cf2355d3cf160af91cc3822

  • SHA256

    d299ed7b0640a80c0d4f2d5d608b47d4a6393102a6f9e7657adf680ad5ee3524

  • SHA512

    9814cf259667518a4cc4ae72d03b15dc369677798ca397b8498205a4816f053e972b9c2b00267024a002e0380b9aa11b91b48172a710996c2d19a369c4d451ce

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QS:zCsanOtEvwDpjO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_40e65f26ff30b307f92c604bb7275282_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections