General

  • Target

    2024-02-17_12c604ffc82f7980b6b847255105cd06_cryptolocker

  • Size

    106KB

  • MD5

    12c604ffc82f7980b6b847255105cd06

  • SHA1

    5d2d0c0ef0ffa29ffc61a5b23c10042fe22e1875

  • SHA256

    5fe86bcb69a65803770d60dd3251fa5d581e7b2f67dc622775dad7b7d433c163

  • SHA512

    1fa547b5ec262d97d29a5287858c63a5638ef018f7b5be8b230b4f71a56021cd4fa390a69b1ca004bbe365e07e8f18c5762f1fe3b1370b20d5aeb758bd24bad9

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfaa:1nK6a+qdOOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_12c604ffc82f7980b6b847255105cd06_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections