General

  • Target

    2024-02-12_c684148190e60d3a108aeb74413f7d14_cryptolocker

  • Size

    81KB

  • MD5

    c684148190e60d3a108aeb74413f7d14

  • SHA1

    0410995bfa9d882d3e875f28f26fe3a695a32f96

  • SHA256

    deefa2ecfc622472be07b6c292fee95fc62c4b2b5eab3ad59648f27ff27451a0

  • SHA512

    bf45cc340da62a29d41c7a7d2f85771807dbfd55acb905e5401140b5744aa51cd1805609287e008c0a302be00a7bf8cdc1322781fded209c2be907b35e1a6806

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2fh:zCsanOtEvwDpjT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_c684148190e60d3a108aeb74413f7d14_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections