General

  • Target

    2024-03-14_19d7f12f279ce2c97b76533c8fee717e_cryptolocker

  • Size

    118KB

  • MD5

    19d7f12f279ce2c97b76533c8fee717e

  • SHA1

    10576cd5eb3a4227aa4985e41b5d0f406e47c6b9

  • SHA256

    fcb4fdcd8378785e0fab42d8fa633acbab2adbef5325996acb310c1a010f128a

  • SHA512

    afb56992e5b2bbd039be2e9f85cafb164e6c5a68ad4a67012845b958ad2fd051d8e4d906990525abb24be57e44aaab298fa5398d7accf1ceefd80284848aba9b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01L:z6a+CdOOtEvwDpjczp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_19d7f12f279ce2c97b76533c8fee717e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections