General

  • Target

    2024-02-18_d12e9b8ac12407d838dc0b0f8136b25f_cryptolocker

  • Size

    82KB

  • MD5

    d12e9b8ac12407d838dc0b0f8136b25f

  • SHA1

    fc6ff1738557da63ee9a0e1f3ec43430f281f258

  • SHA256

    c7b247e29cd88dd5adf28a2e67b755a56595f9fbb92501eab11c48d610363847

  • SHA512

    0316453b6c60861bebd285c56d01874e214cbce8c82e02ced93bb128130f1b25d6d2837544a7612a2080ad90f2bd782c622c47a0dddb1a44753cf90317ad8138

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1U:zCsanOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_d12e9b8ac12407d838dc0b0f8136b25f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections