General

  • Target

    2024-02-13_19a802cac74e780caf9628b41991e037_cryptolocker

  • Size

    80KB

  • MD5

    19a802cac74e780caf9628b41991e037

  • SHA1

    0384439081bdec9233e414b8e9c466fe0930380d

  • SHA256

    cb7d2d9f08e7a28c633222b1902dd7d023bf0ea4d44de7fb6b63ae354c5a6d0f

  • SHA512

    f2efb9836c69ba7bc877cedae6cb2903733e930b36ae4d6cbff269d0b0331ba97dae6f2d3be3416b7f101d8a3ae3bac9aae63878c90393cf0a5d0498916f6218

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0d:T6a+rdOOtEvwDpjNtO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_19a802cac74e780caf9628b41991e037_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections