General

  • Target

    2024-04-05_5f8b94016fed075fe9047fff37c8591f_cryptolocker

  • Size

    109KB

  • MD5

    5f8b94016fed075fe9047fff37c8591f

  • SHA1

    ac6b8a19dae43342cc52fb139f9ea9683f9b56d4

  • SHA256

    c106c33142e4d5c6483d0c24c388e8d49d32e5b7f8469a86bc6c3a2dac73f6c5

  • SHA512

    c6a68f98d0958e9091febd5c752bc4b5b5db557c403968cd3078c69523bfac4e5537afa154311c01c4e1ffed026615327c7a8f19d4eacb8c6f61598b797b7649

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszft:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_5f8b94016fed075fe9047fff37c8591f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections