General

  • Target

    2024-02-20_c58cd40ce50447aaf2fc17f390a3d896_cryptolocker

  • Size

    71KB

  • MD5

    c58cd40ce50447aaf2fc17f390a3d896

  • SHA1

    833eda6cea34eade81ec8118acf9ca642780aa06

  • SHA256

    0590cb7df8f42c0940360922463dc7da3d818bc4c358af75c77216da5652c33c

  • SHA512

    888f9f840138903a2d3814256a769eac116c305cd04456567a9a1d34e4febc8ecf3abfa60e27534001d467c56a6dca3fc215a0294ccef447bedc447132fb1338

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalB:1nK6a+qdOOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_c58cd40ce50447aaf2fc17f390a3d896_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections