General

  • Target

    2024-02-19_616a240460978815490576f3907e9fba_cryptolocker

  • Size

    62KB

  • MD5

    616a240460978815490576f3907e9fba

  • SHA1

    34ec5ca3a7e5bcc5842801f921b9a094af88486a

  • SHA256

    ae9677f01ed20ad426073ef57015f9eec3e2a81cd19772b136ebd868001985e3

  • SHA512

    dd95b75e93def2225b7dd2ae98f63181948e571ab89b89bc66628b0a6b7d5a7dcf4b6a11c7b8545f02c65e6564c928a9203827e5cd69cdba994a8c5b45287e13

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVr:zj+soPSMOtEvwDpj4kpmeLmnh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_616a240460978815490576f3907e9fba_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections