General

  • Target

    2024-02-23_e579c5567a9ba5a36a4de5aef2331121_cryptolocker

  • Size

    82KB

  • MD5

    e579c5567a9ba5a36a4de5aef2331121

  • SHA1

    265e4013cfe374927b70faf4cdcdd7ed3bf50dee

  • SHA256

    ddcb6caedf549c975f7c1fee23612c5a8367e3205b3d2515e2c349bf5b858efb

  • SHA512

    44bfdc72862933b2847670018f97bd051655c98d8a7ffc1610d9c3cd422a1de4b3169fae9e64403d21612181d2fd6f4e238500152ba5b19b1b012adca469b7f1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1F:zCsanOtEvwDpjv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_e579c5567a9ba5a36a4de5aef2331121_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections