General

  • Target

    2024-02-19_74b3b9062149a1e718ab1d0bba52ebf7_cryptolocker

  • Size

    65KB

  • MD5

    74b3b9062149a1e718ab1d0bba52ebf7

  • SHA1

    89f4a45f068bf619bff905482f787b77a6aefc4a

  • SHA256

    943ac04bd14fc0f936d926fb18758befb1af43f78ada6aca5d140a23c6b2bd6c

  • SHA512

    5d075c90305c73ceca593482e92c703d18358e5154036105f76035cd0318c5d4632adb83e3aa1a15e88f73c5cbeb8d92d1e0dcb683044f8794eb8019d347fa5a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6U2:1nK6a+qdOOtEvwDpjX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_74b3b9062149a1e718ab1d0bba52ebf7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections