General

  • Target

    2024-04-10_75817cbd5b71b7839bdac63b7ee0b17b_cryptolocker

  • Size

    72KB

  • MD5

    75817cbd5b71b7839bdac63b7ee0b17b

  • SHA1

    1c59219808bd4eb02f4d7d2466b084135ae7b5ff

  • SHA256

    419b492cb8fc59d9b5bf970bf92ada343054ce3c46b49e857555a5e1c78eb076

  • SHA512

    95f7fe465539c438945d639a5fa6318f90fc5861e79974253773cc0b30e2e8a5a6c5c6669cf76445f22d7775a9d3ca758faf886a4d3e9280ff6a76992dea62c2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalPH:1nK6a+qdOOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_75817cbd5b71b7839bdac63b7ee0b17b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections