General

  • Target

    2024-02-24_1fbce082d9067b2f510d9aa90acbb26c_cryptolocker

  • Size

    87KB

  • MD5

    1fbce082d9067b2f510d9aa90acbb26c

  • SHA1

    993c79ac0628c717f1611d3c8024d1ac3cc973a4

  • SHA256

    2ed7ce79a6037732c6105c959e2f3629fb13d20336334385e27c759b4eacf59c

  • SHA512

    059fccb5747d243e05d3b30cd94df871543c17167a926b34ed14bc91f0d08abdb08ba0f368a78669b9405814a06ebf5a9f5f72d671fa7e45097f7b981423c6a9

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8t5:zCsanOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_1fbce082d9067b2f510d9aa90acbb26c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections