General

  • Target

    2024-02-19_d3c6d586736b6b45ec04dadb1f55b6d6_cryptolocker

  • Size

    113KB

  • MD5

    d3c6d586736b6b45ec04dadb1f55b6d6

  • SHA1

    844f99014fc3d005fda120439a06e6e842d023ce

  • SHA256

    e21c571f358c4f769e559b0fb12098b12fba0b3536abb876eaa6a4d28e7d8570

  • SHA512

    aded8e9df5f8fa305f608179052f66a617c6e855ba4b5153cfbbf36f10e6c0fd0633b1611504fce6439cc6dcd8014d870313e5a390fb21d50c8307371c6ddeca

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp0n:z6a+CdOOtEvwDpjczf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_d3c6d586736b6b45ec04dadb1f55b6d6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections