General

  • Target

    2024-02-18_371099155037bdec412a841a67534499_cryptolocker

  • Size

    79KB

  • MD5

    371099155037bdec412a841a67534499

  • SHA1

    82c2666347afc07e9b8daf467b01d4270dc58f4c

  • SHA256

    f12154c8a00eeb1facadd8acc0b2adbd6f85d9cb83e66b97edebf6150ce0f14d

  • SHA512

    bde393aaf5bf912df178de90254157c5c7a6fb1a40ec44bfa14c2afc3b7c8d8656798ede91c1e8fc064b8ac88898f92f958607183177fa32dd04871ec1e0845d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyhuqP:zCsanOtEvwDpjU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_371099155037bdec412a841a67534499_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections