General

  • Target

    2024-03-15_51fadb36c7cf6264cfed5d70d37a7b4f_cryptolocker

  • Size

    62KB

  • MD5

    51fadb36c7cf6264cfed5d70d37a7b4f

  • SHA1

    c86d1c626f0ee7f4b7a4f65b12731d82e74a77de

  • SHA256

    613949c769757032d233c75ab8ca83cb562a8fc7856eea066078ff4d438ef189

  • SHA512

    704585bd23febc5a3a7ca6f83b1edc0c234413a186a2d09000657e741189d42113020c73991e777aa30ade254c5128d64845590239b32e0a5031bbd17462ab19

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKk:P8mnK6QFElP6n+gymddpMOtEvwDpjYO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_51fadb36c7cf6264cfed5d70d37a7b4f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections