General

  • Target

    2024-02-18_49dad72e75a9e39df9e4910bfb020c78_cryptolocker

  • Size

    104KB

  • MD5

    49dad72e75a9e39df9e4910bfb020c78

  • SHA1

    71d19a3606c0723165ec2782abd7f079b8f2a069

  • SHA256

    7cce4aff18e0d13344d92340d32a25137d29475ad3d4a890a6c3eeb80bc1c3e7

  • SHA512

    6fcb297648ba06d5d78780b2dbcba8f75621a046ec2cfd26ebde19c96d8775860e24e29f9963bbc235d4aad5b18cadb5163a204a04ab4a38cc750e2fdeee450a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksA:1nK6a+qdOOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_49dad72e75a9e39df9e4910bfb020c78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections