General

  • Target

    2024-02-13_a818724636ecca4f05308adce6102537_cryptolocker

  • Size

    60KB

  • MD5

    a818724636ecca4f05308adce6102537

  • SHA1

    15ea56838c1311e79d18050fbf2dea2d9e9e70ca

  • SHA256

    068bd0a3a07432902d4554949d482169afc2b228513cc3c01826dc8eb483c172

  • SHA512

    89d902e343c17db3019d0625d7b0c50788c9f8ac2b1d24b118c98ab06202b9cb6e460e71f24f9b1251834e835fbf49b71d4065ba33c110724f29d77a5943a516

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5m8M:zj+soPSMOtEvwDpj4kpmeLmv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_a818724636ecca4f05308adce6102537_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections