General

  • Target

    2024-02-18_5818f0faa33ab9b4d60e5226f579aa91_cryptolocker

  • Size

    80KB

  • MD5

    5818f0faa33ab9b4d60e5226f579aa91

  • SHA1

    cb773943608f513bf72b08a646da422e1903f535

  • SHA256

    271f92c56d84c090bc2335e7c0492f129bfab15ebf4cd67bcfd7b174718d0dfc

  • SHA512

    990c34d6212c9d316c188163554ab7b74680094f225bdd2fc0a89449c0cf2b6a52203f0d94b934612415fc457ea8e6b5ed6e575501700b0fa73d5cb060b08f93

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0x:T6a+rdOOtEvwDpjNtC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_5818f0faa33ab9b4d60e5226f579aa91_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections