General

  • Target

    2024-03-19_66be554f09ecdc812ea07800ddf4b4dd_cryptolocker

  • Size

    80KB

  • MD5

    66be554f09ecdc812ea07800ddf4b4dd

  • SHA1

    a790424341900287b2fe38979f125a97557f5b66

  • SHA256

    726b560366bb4a854985d7d2252d0ae38fb635b0b402405cc0483ec73659b6dd

  • SHA512

    50a68da341af4e68bc7301b024058c21643e7b59e6f434555226860be8da1760518718981daf96b38f1ee9b64acc18c78df3367ef2b7e760f99ac23b063e28e7

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyS2zZr:zCsanOtEvwDpj+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_66be554f09ecdc812ea07800ddf4b4dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections