General

  • Target

    2024-03-19_193dd4a55ce24ce8356db1f2e13d66d3_cryptolocker

  • Size

    66KB

  • MD5

    193dd4a55ce24ce8356db1f2e13d66d3

  • SHA1

    db5d23b1375dfaf423c8748da06c3a78af3e7b0f

  • SHA256

    7f5aaa17fe672f66980d76f9960f288d251d936d19e59d8e4292952d75c4b187

  • SHA512

    034a67560a3a7f9a154ac4c6f57d296831ad6622ca8f6a39e84dd952936c786692419dce1d09c6ebffd18bb405e19995a0252a8b7fc627d75d306ea180f73706

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1Fm:T6a+rdOOtEvwDpjNG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_193dd4a55ce24ce8356db1f2e13d66d3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections