General

  • Target

    2024-04-05_1f681f4fb4ee89e5e218f2fe7d120d09_cryptolocker

  • Size

    85KB

  • MD5

    1f681f4fb4ee89e5e218f2fe7d120d09

  • SHA1

    fe9069a28ab911a3076b6a2c2d05ee82140c4c26

  • SHA256

    0916e0bb3971e4dc47a61e1d82bbff73e503882e9121a9811e66155c1e2ed53a

  • SHA512

    eac290bb99bc24ab38ccaf7c0ac1b885a5647469909fc90fa5b1892a2944c6249e94f298c192fa077c86bfd14610eb2dd1f44f95826c44aa7fa5c85532122417

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1/4:zCsanOtEvwDpjW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_1f681f4fb4ee89e5e218f2fe7d120d09_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections