General

  • Target

    2024-02-19_b24452b9c6af98e02563854de557c06e_cryptolocker

  • Size

    117KB

  • MD5

    b24452b9c6af98e02563854de557c06e

  • SHA1

    05e72bb7b76e55f8b7d1fdb1d0aa3a7a64987be0

  • SHA256

    6a74d51346b3a6e5f44a2bcf72b06be852bcf466775217502a318c56383de442

  • SHA512

    dc993c72d732fd413fc30d30ab5abf2979e453f8816257c6417e2ce881b2d027f7a93726e72049ca11313847ea6c5fcfa0246634704a38e6c4beb63699c4520f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01kQa:z6a+CdOOtEvwDpjczm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_b24452b9c6af98e02563854de557c06e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections