General

  • Target

    2024-02-14_59ff318a9a2de23925cc91e6e5b904fd_cryptolocker

  • Size

    105KB

  • MD5

    59ff318a9a2de23925cc91e6e5b904fd

  • SHA1

    f614d80ac1cbe69f8bdcc1cf2babac8d9a3d0d4a

  • SHA256

    c68358112d83349791271b4d53d3956a063fbf9193964ea75e0c819bf93b9f4f

  • SHA512

    322ad259f42614ff98344597927c611a785f893be08cda7b918996e175bd1c808b7a0d58d05bc39bc38853111fd96a2bc37fe689f00a7f608c8d2f5c5f47f79c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksb:1nK6a+qdOOtEvwDpjb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_59ff318a9a2de23925cc91e6e5b904fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections