General

  • Target

    2024-02-20_68ca3e1c04208c58618b0b82fc76b80e_cryptolocker

  • Size

    61KB

  • MD5

    68ca3e1c04208c58618b0b82fc76b80e

  • SHA1

    c3b0f60fe26a442b171804ddee31f5770be50d14

  • SHA256

    d19c5637ff362fd5810d43982fe63b85f2d9c9f5f4a1a87ae7bbf830e32ecdd8

  • SHA512

    8fdf577490dd05a6129ec83f9f6265a0ce1fcb4b253ce4554429ca8f7e0aac587dc06555ac70a4f261ac29e0b10a9c6d70c32880a428b3d31074ce83bbda763b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYhxP:1nK6a+qdOOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_68ca3e1c04208c58618b0b82fc76b80e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections