General

  • Target

    2024-02-18_5cd1fb54c6922ce4b29d332797dcd1aa_cryptolocker

  • Size

    117KB

  • MD5

    5cd1fb54c6922ce4b29d332797dcd1aa

  • SHA1

    3819e2f01b42996211b553e5392abeb38cc59ca4

  • SHA256

    258d5b72dc1c7a94e7898dad43a561c8966714b1eb16ce814d9084c27d217b6f

  • SHA512

    f7b21099249e71f1a58d8ad15cf66de791873926911b3c17c1fa6ebb1a4cb32dba31d18851f16bfccfc41d8b2d967a2c7c4b8ff00548362d5ab46b16450d818d

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01kQm:z6a+CdOOtEvwDpjczq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_5cd1fb54c6922ce4b29d332797dcd1aa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections