General

  • Target

    2024-03-11_b19c5909c38cce9f160e42f259172043_cryptolocker

  • Size

    70KB

  • MD5

    b19c5909c38cce9f160e42f259172043

  • SHA1

    f22d26d82c3113e17e7ed1cfc7a64363b9582960

  • SHA256

    d58ef74ffe0ecc6dc99855f023954c994c792bc5442a223cb401d0aaa283d56d

  • SHA512

    eeef076654877cdaa593b29a857d809c59e40f8c30ccfb05ae00b6c66ea7c49ae7ac2f6f8501c563d621f2b9b96fa435f5269b58e31c851f5a2743c8580e71b2

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB+3q:z6a+CdOOtEvwDpjQh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_b19c5909c38cce9f160e42f259172043_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections