General

  • Target

    2024-02-29_f91edae70be3d0e2695f4067ae32b203_cryptolocker

  • Size

    106KB

  • MD5

    f91edae70be3d0e2695f4067ae32b203

  • SHA1

    689171171af1997efa002d346105b1e7c385b6a1

  • SHA256

    eb7837a763f3027299dd6db506211fd5bc8346b27cb639814c7a3f984a364108

  • SHA512

    351d453378d1720cf98df9add5276d8f433b9902cf9cebc0cbc2cd4f01b4655ecda5896f4e3162d768b77b38d2980daecb367e410319d682697a0fe03022d014

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks2:1nK6a+qdOOtEvwDpj2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_f91edae70be3d0e2695f4067ae32b203_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections