General

  • Target

    2024-02-18_51d072cca623f565d92a38598c641483_cryptolocker

  • Size

    64KB

  • MD5

    51d072cca623f565d92a38598c641483

  • SHA1

    ba80a793ac3f72b1b8ccd4e9958ec5ed372eba92

  • SHA256

    33f28e1583ce6142dc26f5c5494edfabd6accf01c787f975617a02233e3364b6

  • SHA512

    0e17cbf2a76bf9f1f4a9cec514fd1f18de333e4ef90ce13eccde0c3d173bfe9bcb3d34cb877fa7c5051141bd5b9e80cdb49a510b56e93f4970d7a766921563e4

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5km:zj+soPSMOtEvwDpj4kpmeLmQm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_51d072cca623f565d92a38598c641483_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections