General

  • Target

    2024-02-19_99cf265bfcdc606e7eec424693ba3738_cryptolocker

  • Size

    62KB

  • MD5

    99cf265bfcdc606e7eec424693ba3738

  • SHA1

    83a50c9089b4fc1ccf8daa0a0de034e436be1f78

  • SHA256

    c58a25a4d00c0dba3232c97c9813d3dc6f1eb0666cf556aae59c83f876029b0e

  • SHA512

    d72900ef01d5df6358adea8a351967221c09e36b4403a4c37eb6db2837d1697bfd4f09be3f30af914dc369d803cdcb26177695361ac1463317910f52de064a8f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8M:1nK6a+qdOOtEvwDpjk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_99cf265bfcdc606e7eec424693ba3738_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections