General

  • Target

    2024-03-12_59fcd2fbf87bffe1033dc2e10416d9e2_cryptolocker

  • Size

    105KB

  • MD5

    59fcd2fbf87bffe1033dc2e10416d9e2

  • SHA1

    c1ea1c09288c46e4209a83d838c1218b7f094116

  • SHA256

    72773c502102244bb8f9407f5b86623d2d332cfad1afbc8f35a68c943cfdbb59

  • SHA512

    e7c368a5c26840f4de85625d5733310ec45d89e37bd3e7a6df95f144a759ecdbaf06639ad38c262be96307c4cfcddd5966236dda6162aa4509bc37f1ade9b7eb

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksP:1nK6a+qdOOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_59fcd2fbf87bffe1033dc2e10416d9e2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections