General

  • Target

    2024-02-19_db6922eecee682c26d73bd7faac9b51c_cryptolocker

  • Size

    54KB

  • MD5

    db6922eecee682c26d73bd7faac9b51c

  • SHA1

    7cf84649b88a42e6a455240de7774feda0cffd25

  • SHA256

    e2ed74b17dbffc4a4a69babdf9b58ee015eb26bd9a129d0ade3dfa8b62297d53

  • SHA512

    8f39c494f8b9dbf7e98c00b804e172ed9d801ddbe5b70c5daffb947101bfd29c87c314b502902cd3155c5c65fe48bfdf646d700c4a78b70cea1c1e1279020aa0

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoir4KtdO46:T6QFElP6n+gxmddpMOtEvwDpjwa3Tta

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_db6922eecee682c26d73bd7faac9b51c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections