General

  • Target

    2024-04-05_229a96b392e83396ae359a918436179b_cryptolocker

  • Size

    92KB

  • MD5

    229a96b392e83396ae359a918436179b

  • SHA1

    8a6aac0c3451f3f91b8dd3430318d47b9c779e95

  • SHA256

    1cff34991671713dd71af5feb47184943013710cee93833d7ddcabd56891a52e

  • SHA512

    067946a146db11e389cddc836d789b667e273f07ad5f66d96eab9f122f705b1666d51552daa544b71cac3ef5e84e2452cd7ffb5ad695b535b72aabc7e67c419b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWt:zCsanOtEvwDpj9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_229a96b392e83396ae359a918436179b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections