General

  • Target

    2024-03-14_1286d28e449756291cce1ba9d19ed39c_cryptolocker

  • Size

    104KB

  • MD5

    1286d28e449756291cce1ba9d19ed39c

  • SHA1

    4ed9ee5466ab058445f11e6feff0dfefceae7243

  • SHA256

    8eff9ec3972b906ed67717db14f1125534105fcfb253163db27f1a9e88a6bd60

  • SHA512

    d9b10cca8521a10d7df9682409c0eec420adfe423b06deabf236a9b754d1f5b2a41593b644b6fb700ed49cfc8b4856a86c388a64c4842c81b53f64865970757c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks0H:1nK6a+qdOOtEvwDpjE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_1286d28e449756291cce1ba9d19ed39c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections