General

  • Target

    2024-02-17_1c16d7caa3f06974fa5c67b15ff35656_cryptolocker

  • Size

    74KB

  • MD5

    1c16d7caa3f06974fa5c67b15ff35656

  • SHA1

    868db728ee9daa4d436be7d72e60a7dea71ec884

  • SHA256

    d0edd12fcb7888ff468ab44dec537ec48ff69e6af503fe092ea3b3cf32e4d946

  • SHA512

    ae952457bf45050c4776caad9d10010979f0d7e718177fbaebfb9f817988e3d4009d62c3305c9cbd50fc33703d195cff214f66268e0147880e3715c1eff2d6ab

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4G:T6a+rdOOtEvwDpjNtHP+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_1c16d7caa3f06974fa5c67b15ff35656_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections