General

  • Target

    2024-02-22_1c6d426b62e00b90dd9f344f571cf8d7_cryptolocker

  • Size

    71KB

  • MD5

    1c6d426b62e00b90dd9f344f571cf8d7

  • SHA1

    f0acc02d5d8ce830ef5d20e6ec5afe73e7e72446

  • SHA256

    9ff8c13191644a7e90f1ecd1729cd562da0cb4a7bf12f511fd06287a09be6499

  • SHA512

    9f3b0cbe773941400a021de9934007276e20351ebd26e27b333c0aebfcaf0fc6ee6130bbb78502331feb7797fc0cf95d69a6cc37037ef10e02d0d804e3a6bcda

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal8R:1nK6a+qdOOtEvwDpjr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_1c6d426b62e00b90dd9f344f571cf8d7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections