General

  • Target

    2024-02-18_2e749a176ebe871f6e7e407dd98c48d0_cryptolocker

  • Size

    56KB

  • MD5

    2e749a176ebe871f6e7e407dd98c48d0

  • SHA1

    2f06b86739dc4cb1de4285961c22eae33d099f15

  • SHA256

    b38f2fce47d03098ec8419050296fcfc1c2a0c89b9a8c3e473c6e01328c766c0

  • SHA512

    5846e9c3375162f041ae9a0ba2a5aa2a1e7fc054fda93bfabcdfe59bf2aa69c2c8b17c63681753595866bd385da893cfcd9e99ab646bc5756a397a7e338046d2

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpymP:zj+soPSMOtEvwDpj4yB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_2e749a176ebe871f6e7e407dd98c48d0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections