General

  • Target

    2024-02-19_12ac1e533863c2ea938ad3855f5c4d90_cryptolocker

  • Size

    107KB

  • MD5

    12ac1e533863c2ea938ad3855f5c4d90

  • SHA1

    75a42213fa4cd178f513b84ebe3ef13aebd7c917

  • SHA256

    b7080ae6724b93cade15b320cdb802ce12bf1f327918c842acc581b1c6a6145c

  • SHA512

    f8a45d64aab282399e2cd20570fa9b7bbab0529827f5625e39b1b73a4518b8a2ed1d96477df590e2d2ba0c5a7712692db455983fa45aa60919c64efe38056fed

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkszfJ:1nK6a+qdOOtEvwDpjN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_12ac1e533863c2ea938ad3855f5c4d90_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections