General

  • Target

    2024-02-19_097ef99f9ca7fb31e91b3fdaaf756025_cryptolocker

  • Size

    116KB

  • MD5

    097ef99f9ca7fb31e91b3fdaaf756025

  • SHA1

    c0d4c75b9bf00ce322e518ba704a00b1765b355e

  • SHA256

    2625946209a08aee97d332aaae0f264602df79c0a4acdc56642224c269f42327

  • SHA512

    102f0eb9989e37e35af6f7d106259a2abee5e2e8228a70a33a4a618f1bb58bf7b2ccc45613ed382b3df9591a262bc860a1611f0a3a27a314f624d6b6875cc291

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01g:z6a+CdOOtEvwDpjcz+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_097ef99f9ca7fb31e91b3fdaaf756025_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections