General

  • Target

    2024-02-22_c619c26b88391a8bdfb0ec6332080f53_cryptolocker

  • Size

    107KB

  • MD5

    c619c26b88391a8bdfb0ec6332080f53

  • SHA1

    e4ce55b84b15f8a97a5c21b73ca8512c2cc5d1f0

  • SHA256

    b04a959557473861e0789ddfc48389653b66c19c2722c9a76f1b965930ae8271

  • SHA512

    55e2c3cc81faf57e7b20954cae6dde3f968ee6464241ba2e02b92dc8bf6b29e316614f5a7faeeddb08c8e40b1bada8fe06a73b17f316e9c2083a5d029400e0e1

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfy:1nK6a+qdOOtEvwDpje

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_c619c26b88391a8bdfb0ec6332080f53_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections