General

  • Target

    2024-03-11_c190a1446b752b0b63a9156f15b9ac57_cryptolocker

  • Size

    64KB

  • MD5

    c190a1446b752b0b63a9156f15b9ac57

  • SHA1

    677704fabaeb6093f6a622df44242f7194c1cf4d

  • SHA256

    efb6c6e08145c03dc33980b3267a1b3c85499917d693aef112964ac2a8401e92

  • SHA512

    48342d59be6f1b33ee88ff934abb9ef02bd0b22332587ad723e21ae6d0e6add7776a7dfb7b06c9a7cb3e259f57be5c66ef5ba2ed0b3fc62f71fef249daab2900

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Ue:1nK6a+qdOOtEvwDpj/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_c190a1446b752b0b63a9156f15b9ac57_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections