General

  • Target

    2024-02-19_29428199fedb8a518b144a45866970fa_cryptolocker

  • Size

    77KB

  • MD5

    29428199fedb8a518b144a45866970fa

  • SHA1

    14ec408607277b7e3e08fb86c3046ba2a52ae6ff

  • SHA256

    6272d1fb3f32ed015d38a9fc711ea8938991025636ad659fed0d3f90c043bdc2

  • SHA512

    617cca9add062d896eb8acbbf0eb34082203240a0861949fcb8ed016cab93e65c2ba2794809dd342e4c9ba5b4a158b09e66ff2bd4e3ac57854c3d96a32e993ca

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kya8/:zCsanOtEvwDpje

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_29428199fedb8a518b144a45866970fa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections