General

  • Target

    2024-02-19_3ea84ec72d72849dc25d3bb593a1b081_cryptolocker

  • Size

    77KB

  • MD5

    3ea84ec72d72849dc25d3bb593a1b081

  • SHA1

    5c0f0bcbfe4c81430d4d1f1988ab022dd6682721

  • SHA256

    ded2e0df91093e52ba1218b66cc069df5fcc2f8e989f8a41eba389f3ade1f24b

  • SHA512

    1259a2ed72433acdeb600d0adbda1bbc61fa1def8be086d7f6616ceba138cff9d4d95c8ea3a9b2c5be9850e078247aed8b8a6a092cc82a3c76b5e04cb2a6ae97

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kya8n:zCsanOtEvwDpje

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_3ea84ec72d72849dc25d3bb593a1b081_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections