General

  • Target

    2024-04-17_861f1cd1717e263ecbf93c417a4ebf1a_cryptolocker

  • Size

    106KB

  • MD5

    861f1cd1717e263ecbf93c417a4ebf1a

  • SHA1

    903229c000b5900f1a31cbb68121075d63bcfc34

  • SHA256

    2080025f9c88a209cfbc47fef8abfb727a4e00b0fcf185b413ccd5c4ff036d91

  • SHA512

    07daf37b4d3d4fc192c1f3f767cdb19f99d77a8d3a301d6e13b284440b2fe9eeb014b5f24ee572fac2567e94d056a9ba75f5aa8ba8fa59e3a98ede233b78058a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksdEq:1nK6a+qdOOtEvwDpj9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_861f1cd1717e263ecbf93c417a4ebf1a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections