General

  • Target

    2024-02-12_598a5b354a22ec55ec3c5b7b746089f1_cryptolocker

  • Size

    81KB

  • MD5

    598a5b354a22ec55ec3c5b7b746089f1

  • SHA1

    762e7230d05d60f9af1d6bd4a60786e1cbde3e4c

  • SHA256

    bfdf318db3ae64c4c4ca66408871d93957debdb70d98a6bdb809e0988bfda1a8

  • SHA512

    578e9945603d37aebbc578f5e3962bb82f58f2aa428955622781e76255c15979b93fce62107fd73eac7fbc847e09eabe6cdd6451568d4874c5d30f7be1269d18

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7AJ:T6a+rdOOtEvwDpjNe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_598a5b354a22ec55ec3c5b7b746089f1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections