General

  • Target

    2024-02-19_1319a1b24d4de180534dd3043c058c3c_cryptolocker

  • Size

    80KB

  • MD5

    1319a1b24d4de180534dd3043c058c3c

  • SHA1

    dc167fb3384fa5517f1d8c511f76d6e21416214f

  • SHA256

    ebdb36b2ab2c0b61a4890eb4ac7b1928d4669d75b3b3c1acc97b9988a7414757

  • SHA512

    696e92a543b231f970f898a5f5584832095c0accfd0be73b5c13d1d92fc3109009d72359404c3e4bd650fd5d62a5b75b5e9b987d2067ed6e10ba11d412a14c84

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky27Z:zCsanOtEvwDpjf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_1319a1b24d4de180534dd3043c058c3c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections