General

  • Target

    2024-02-24_1c877ebd394213b946976fefa8044fbc_cryptolocker

  • Size

    116KB

  • MD5

    1c877ebd394213b946976fefa8044fbc

  • SHA1

    e9558d7c911a522fa93875635884d13ad119f799

  • SHA256

    300d1ea4c61cfa6adf6ca7699d4de2cef6ec061cc2d32ac0474f93090ee4782b

  • SHA512

    8f56ae5993c0e4803b8432f7faedf6903e82d908e27de390f0a80e89d5ec86f86c5ed617819a9eb7d24a2df03ee628f4ccc53b837c986f59e9b6fe8a605be621

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01A:z6a+CdOOtEvwDpjcze

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_1c877ebd394213b946976fefa8044fbc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections