General

  • Target

    2024-03-08_c2c1af440a748b0d1f832981ab39cd12_cryptolocker

  • Size

    92KB

  • MD5

    c2c1af440a748b0d1f832981ab39cd12

  • SHA1

    8d32428c7d4d5b4d1579c5dad358046f591c7b00

  • SHA256

    3581f50e37b17a91616cc8fc356057ccc098ecd133479daac74c35e63bd3c175

  • SHA512

    d312d4d7a0bc39471c5a3d08359433a9b431952ac1c5d11802eb77ddbf98a32cb08c90797b9cd491517d9ae5b663158911e69270459a270c4268703ecb4d60b4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uvaa:zCsanOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_c2c1af440a748b0d1f832981ab39cd12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections