General

  • Target

    2024-02-19_185db30cd97dc1eb1ce33e7ef7f43bf4_cryptolocker

  • Size

    77KB

  • MD5

    185db30cd97dc1eb1ce33e7ef7f43bf4

  • SHA1

    1e229b0b149211f8bc0b70c06d50a0169d52bfe0

  • SHA256

    f8d70ec2c2ca32b068c7efd214acbeae372ae25918592a9f4361f1b83c18947d

  • SHA512

    72ef41a8836af79200f8e1a2c0c42f7613a1a93a30490c99871427d990688f47b1a1304b7390fae15e8b2b4187de22214da93c1229926b4f9735fb3287dcd269

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuA:T6a+rdOOtEvwDpjNcm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_185db30cd97dc1eb1ce33e7ef7f43bf4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections