General

  • Target

    2024-02-14_1cd9accb3a1aeae50466b72158417073_cryptolocker

  • Size

    115KB

  • MD5

    1cd9accb3a1aeae50466b72158417073

  • SHA1

    1a7c93509f578b40d466aee0b26f4d603bc11e7b

  • SHA256

    7216d33612a6d39efcfc2e4ab0e0bb101c7890383854e407dc750e108b72f9f7

  • SHA512

    543c6be22e94d2fb62297b096e0318146cf709a4b437a33033e659d5b654795ffac6ebb97bd755b7766c1ee97b84b4a4446bd34e2ba89b4938d637488204bba3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX93i:T6a+rdOOtEvwDpjLzm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_1cd9accb3a1aeae50466b72158417073_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections