General

  • Target

    2024-02-28_d9c5b06f4dcdc6fe536c383353d5e6ea_cryptolocker

  • Size

    72KB

  • MD5

    d9c5b06f4dcdc6fe536c383353d5e6ea

  • SHA1

    4f277fcc2abfe74d4060acdf8e6904ab75f9abd0

  • SHA256

    2f5c6938420563035036cab78fcf84985caaec087418f1e7fb58ec2b799ee08c

  • SHA512

    51e6e26e80a0ad558bcdf808edc77ff4dd63b4e93b641c607825b4f530981427d9c12209a8daa8b4c920579fe62562722b3e6d7a4048782aa6846c568b4acd64

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal8t:1nK6a+qdOOtEvwDpjn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_d9c5b06f4dcdc6fe536c383353d5e6ea_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections