General

  • Target

    2024-02-29_e919dfc18d1cbe20cf1c47c603d23920_cryptolocker

  • Size

    66KB

  • MD5

    e919dfc18d1cbe20cf1c47c603d23920

  • SHA1

    37b6bd84c6f05ef129fa6cad6d0a8c801c895dbd

  • SHA256

    b59a57d24060afe38de0811f8d0e9deae9a341a92f418d69843963e4d579ce52

  • SHA512

    096e9885ddad1009bc929e337abc72279bc3c23dae29a5b03514225efeebedfc21cd689604470f1fe24a5219f76cd6f3505150eaf56221d2891a007fddaa1d54

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBL:z6a+CdOOtEvwDpjQZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_e919dfc18d1cbe20cf1c47c603d23920_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections