General

  • Target

    2024-02-04_1e6de9ec7d2702cba31402325052eea1_cryptolocker

  • Size

    90KB

  • MD5

    1e6de9ec7d2702cba31402325052eea1

  • SHA1

    983c4f220977fd547593ad99054dd3e8ffaa0e24

  • SHA256

    19bca3a88df721aa8ebb53efb87f223cf8aaf753234dde0ca805a5f07c0cb5c6

  • SHA512

    ccaef559d319189b87b23941accdbd4b146ad234a3e7ac6929a1a4cbd5a6da6675e10056311e0386c08cae736cdb406d16a6f1cd158dd471cea767149d3043ac

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Z:zCsanOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_1e6de9ec7d2702cba31402325052eea1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections