General

  • Target

    2024-04-10_1df5ca694159c8f8741e2e921aeb50fb_cryptolocker

  • Size

    59KB

  • MD5

    1df5ca694159c8f8741e2e921aeb50fb

  • SHA1

    f84d62b4d80f1bbafd9223b8ee98b14310b8b7f9

  • SHA256

    77e7f81bca6e0148e5757a42bf1dcb38947934623271968c61f7b109efef933c

  • SHA512

    78c2e9136b41c1e85058605e8c79d4ee48fb5c82e0a81ff235104fed75d27968b613e2e2331785d0f29092ae7faa595136de9edf3c50b67515e2389e5dd358e3

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpysnymI:zj+soPSMOtEvwDpj4yRymI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_1df5ca694159c8f8741e2e921aeb50fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections