General

  • Target

    2024-02-24_197195e6f23870fdc13bc3a25509a4dd_cryptolocker

  • Size

    64KB

  • MD5

    197195e6f23870fdc13bc3a25509a4dd

  • SHA1

    e901bbcc4a6cb47abd466977a93427d6821f1e73

  • SHA256

    1a586ca7e3d6f21d1f76b2dab243f7721c11c0eb13c1b0fd936efa27bd66507f

  • SHA512

    4040c2880cfd5ec7a9006f91e5c69e0e974d301db70edeacaca85003e4552cc634aa5891fc80aa18c965b8d9e72f4f72752dbbcfce9eb93e97c0b0119a8db961

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoN:1nK6a+qdOOtEvwDpjz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_197195e6f23870fdc13bc3a25509a4dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections