General

  • Target

    2024-02-17_5801d189022427fee0471af76750a87f_cryptolocker

  • Size

    58KB

  • MD5

    5801d189022427fee0471af76750a87f

  • SHA1

    e93db9c66d518d966adf68e066ceb3f84beddb19

  • SHA256

    687b1b7ff4e8c8385031dbc382509f16ef6517cf72fc1cdfb16d113f107e60a1

  • SHA512

    bab4472d8f517bd7dcdfba1acd34a93f3ad029056f8a88463f52a41046844358f1a6439addc4c7e118942e4854778c27026000909db21e40b17e9f6554c44fdd

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8Ih:T6QFElP6n+gxmddpMOtEvwDpjwa3Ih

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_5801d189022427fee0471af76750a87f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections