General

  • Target

    2024-02-18_11008d329acc9a503db34f69ca36f59e_cryptolocker

  • Size

    66KB

  • MD5

    11008d329acc9a503db34f69ca36f59e

  • SHA1

    fd6a9b78de9102be23c80870dea6d3abfde96102

  • SHA256

    0de83974af659bd7a1ed336eecb2279f4a19e55745e3e7d400ca2b8d59906346

  • SHA512

    21334217ceb20370ed09d45c65110b7c1a07d650952aae47e6ff8033dbeb52da4371986c7310c30be87e150d0136492c1ebe1ef9b23559e7b0b583c294f5f098

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UncBV:1nK6a+qdOOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_11008d329acc9a503db34f69ca36f59e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections