General

  • Target

    2024-02-02_ce1f3e1b6721dd61bdee53f4eb4bbe2e_cryptolocker

  • Size

    79KB

  • MD5

    ce1f3e1b6721dd61bdee53f4eb4bbe2e

  • SHA1

    6ee2c3572808151213c15947fa1e49197608c76c

  • SHA256

    c2399b5df6d3f30d4b1ee777a2861128bd4cf1a09204514057332acd101ddbaa

  • SHA512

    ab48f58ef77ca6a57feb5240686dc567b2d359b837102d855e2b5ba1e8a5a3dcf3d623b4ec4de17ea6c7b273e1d07e3b89b331fee65a2e0430e8ed6fd333be91

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0y:T6a+rdOOtEvwDpjNtB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_ce1f3e1b6721dd61bdee53f4eb4bbe2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections