General

  • Target

    2024-03-19_092b49b1104afd69a95fb398c374c3d8_cryptolocker

  • Size

    56KB

  • MD5

    092b49b1104afd69a95fb398c374c3d8

  • SHA1

    846e69add84aaa448c398c57838c062696a42458

  • SHA256

    4cea3c4104d040e8c4a048c323dd094c774a4747ad93416ab8739d6fdd62247f

  • SHA512

    558e252987f2e5612d11ac5b8796c36409e00ff9109349998d2fd789930ae1dc8f65b197d7d15f610ed08820bc6cb89291fc3c9f068c05df5f411da63ea0f484

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpyf:zj+soPSMOtEvwDpj4yu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_092b49b1104afd69a95fb398c374c3d8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections