General

  • Target

    2024-03-06_592a4a56e7611d245817e6942e058e93_cryptolocker

  • Size

    58KB

  • MD5

    592a4a56e7611d245817e6942e058e93

  • SHA1

    d06e0353f412550253cf786c03f329ab39ca1585

  • SHA256

    1b1b40e2f45995b3eb00c519844f624e654b5a01c3d87d2cdc566a6cf5e9ac7d

  • SHA512

    dfe5072bea6a7010ef41de69e4688b760298ac75c7647c7187f08e634c5a73a8a117daeb0816d0e8f90decfb21813640647d6a7c3f71bf388e2acb8e252ad968

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFfPV:z6a+CdOOtEvwDpjQV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-06_592a4a56e7611d245817e6942e058e93_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections