General

  • Target

    2024-02-13_a1e111f199936910fef9916277cfe14f_cryptolocker

  • Size

    66KB

  • MD5

    a1e111f199936910fef9916277cfe14f

  • SHA1

    2b317fa22fd77bdcdbcad4304c85ccd600f9a6c9

  • SHA256

    557d9cbe2cda20336cd4ccb1d8db23a3e33b2b4c336291274bd54d2f8226b512

  • SHA512

    a05320396e1013ca3642891548c0b7a9cc74ae291575e52c6b2871a309af1792daec754e305f833ba2fd84abc46fe229a878644de8cdd24265a6e768f7ecde25

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBZ:z6a+CdOOtEvwDpjQ7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_a1e111f199936910fef9916277cfe14f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections