General

  • Target

    2024-02-24_c370efc59bb1b974b1206a5ba21ad27c_cryptolocker

  • Size

    120KB

  • MD5

    c370efc59bb1b974b1206a5ba21ad27c

  • SHA1

    eda491bba0ac82ec50365dffc89341f6378200f3

  • SHA256

    9f37b70516758f5fc2fcbdc7c3c0d9c8fd64bd622dbd380c5f12a3a77b228603

  • SHA512

    d30ab49cfc0aaada3b49c7f9f7781056491e4346c130ed24e388e2b04e9b722fc57032c85ac62d7a71aa42b5355677b61919d419f556bf896ec2a24408fa0b04

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t3L:z6a+CdOOtEvwDpjczS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_c370efc59bb1b974b1206a5ba21ad27c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections