General

  • Target

    2024-02-22_c2e4ee4bc16782c079c2ddf48a801b90_cryptolocker

  • Size

    93KB

  • MD5

    c2e4ee4bc16782c079c2ddf48a801b90

  • SHA1

    c2b5d2351f4bdee970567acc960c57a1d1a40b80

  • SHA256

    9bc47a28954009f8390a7cc49868b8a455d67e7ab169a2e2b19c17574385d777

  • SHA512

    7d80fdc33372174e1b95ac6a03c87674bf1e4560d7fe03c7e75b7e0d0e2a27bd87f049d175adc25433290412107dc2f733244ccf550049812229eb9c0a80c34a

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/H:zCsanOtEvwDpjBH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_c2e4ee4bc16782c079c2ddf48a801b90_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections