General

  • Target

    2024-02-11_de622bdb9dce6005abd39c4963f51a93_cryptolocker

  • Size

    82KB

  • MD5

    de622bdb9dce6005abd39c4963f51a93

  • SHA1

    59d4d75c34f7eb4da272c461095997c737e81f7b

  • SHA256

    88d668c6a3976c4a3e7abc47c40dbd43598fcbd2ab78d59e1e0992cd7032c791

  • SHA512

    3a6a1411eafcd4dba4490b6478bb58ebbd8ae0f3213f6fc3f8a256403bd1e5e16f804fba017927c5f9238f1a98f5c803c48183e92ed3170198c5a82895037f9e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7pR:T6a+rdOOtEvwDpjND

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_de622bdb9dce6005abd39c4963f51a93_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections