General

  • Target

    2024-03-06_1169c22e1e8955d9b3f38b4b3d3bb585_cryptolocker

  • Size

    83KB

  • MD5

    1169c22e1e8955d9b3f38b4b3d3bb585

  • SHA1

    30299f5d31d5e318a01b25690db706227bf09923

  • SHA256

    928b0f389a890ab9ba00801e1e181645c7a1ceb41379e3382031d2545929f391

  • SHA512

    4812a2fb9e4f8cbf0774f02209a864b3058d6cf5e83a961c7027e64199f322d5468e4df667f58d540e505b676fe15aa33b6b7c720eedfa71ea342719ba259ebc

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7p5:T6a+rdOOtEvwDpjNb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-06_1169c22e1e8955d9b3f38b4b3d3bb585_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections