General

  • Target

    2024-02-22_596f0b5aee74692641683969f54105e0_cryptolocker

  • Size

    83KB

  • MD5

    596f0b5aee74692641683969f54105e0

  • SHA1

    7036630585236dce5ce29b2269cfde426ebbdbb1

  • SHA256

    29f58a39b523792f3bbcaac1e50033f2d35630417ba094bf17b0f4501cee437c

  • SHA512

    944265695746265dd66db13fe210e82ef59b25671b5ecfdb63e1b65d1eef16e8709acb569c7f3270f765ca67378182a93a6b0b22704276c3063c4c2490ec586d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1G:zCsanOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_596f0b5aee74692641683969f54105e0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections