General

  • Target

    2024-02-22_7e1cdb0cc93114d2e985c1d23e85f193_cryptolocker

  • Size

    59KB

  • MD5

    7e1cdb0cc93114d2e985c1d23e85f193

  • SHA1

    f8dfb58b4aab1e0b54ea322ad31185ac2ca375b8

  • SHA256

    393113275a8a460b4a46048a079d0ee706e2b56edb10b5d952b02b85f364c0fb

  • SHA512

    84ea52b67ff108af65ca604f029cffd22b92eafbf426415e7fa721c1c1663ff62606f66359934e77c20b94811fad505a24ab6fad1ee8b04a66e25fbb74415e59

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLU:zj+soPSMOtEvwDpj4kpmeLmg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_7e1cdb0cc93114d2e985c1d23e85f193_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections