General

  • Target

    2024-02-19_241d961534e34a4ca739722d8c2ac568_cryptolocker

  • Size

    62KB

  • MD5

    241d961534e34a4ca739722d8c2ac568

  • SHA1

    2d1629ad826d3dccd223ef8e5c3b8b7d8aa59410

  • SHA256

    fedaa3fb6ae4ee8b98cbca311572c186b7ae185a5d187515d154fb638ea1aac9

  • SHA512

    27e0079eabe0f7948e1d3641cc5690b84927bb5aaecc10c5a904eeafa1028821596cdc0f6494da6b12e3fccaf65762e766d4fac6ee939f4893fecc926746e37f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ88:1nK6a+qdOOtEvwDpjU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_241d961534e34a4ca739722d8c2ac568_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections