General

  • Target

    2024-02-24_138b2da3d73d1f0ed25d917cb413af36_cryptolocker

  • Size

    63KB

  • MD5

    138b2da3d73d1f0ed25d917cb413af36

  • SHA1

    5e0874b9435480190d437a8549e17247d67a3473

  • SHA256

    70f4ae7e2aa297070702bd0da5c0b2523470470fc9deeafc18d3a3bfac19df1c

  • SHA512

    4a8df8a1ec03bd300b78658cb7fae8ea4c7cb84d884a4ef98582df18c5c0eb62984907d63f8cb100d2a680bdb65b5a1fce3366923e1c00b1aa63d99787101ed9

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo3:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_138b2da3d73d1f0ed25d917cb413af36_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections