General

  • Target

    2024-02-14_c0e9df61e787b1dfdf138afb7c4de3d2_cryptolocker

  • Size

    71KB

  • MD5

    c0e9df61e787b1dfdf138afb7c4de3d2

  • SHA1

    39b2787ff80b731e16c257af928023df53bf79e3

  • SHA256

    33e0ab8f5fdb19b1e9bdddcee09a09545d90fccfe945ad18c6ae4d9cc50c798b

  • SHA512

    c7cadf9b9e3e7dee8f684ac704ff93f641500c754edb85a1c5878c56c1c1adff5d310f95bccc5099d55cc5426122a9634dd7d77d35afda8634387699875f69c0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalei:1nK6a+qdOOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_c0e9df61e787b1dfdf138afb7c4de3d2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections