General

  • Target

    2024-02-18_d30ef9fc88783906ce69d6f48be50d49_cryptolocker

  • Size

    148KB

  • MD5

    d30ef9fc88783906ce69d6f48be50d49

  • SHA1

    9c2e5d43d92f98301f229340daba9da5b2ffbfd8

  • SHA256

    2e77c5b2df02bb3efb22c33685f8fdfada3f89d2c4ee9a5598fc533c7179e347

  • SHA512

    daf68cb99f29d099fde3f584e4ab2de62317bcaf7d6d20193d500d3e25989814390b29ff9170723793c5c3de4bd0abd7fedd93b34433459e8946830904ee0a92

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eV:z6a+CdOOtEvwDpjczf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_d30ef9fc88783906ce69d6f48be50d49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections