General

  • Target

    2024-04-17_1d19c9f71952dfd4e27d29b6eda32301_cryptolocker

  • Size

    79KB

  • MD5

    1d19c9f71952dfd4e27d29b6eda32301

  • SHA1

    cab6b62ae77c832044709fe43b6a99ffc7a1d01b

  • SHA256

    ada6957bb8fa35bf9863488986c0fe0f8786e0936e4b928fbf81afddf4eb4e73

  • SHA512

    83d66998f4f00ecb4d457f284e3e00e6f47a2cb5d64c6adb5307f90f2d609a8b24558a184a9ba1ea5037938552477615227992d8da9c742fbe4b9c6ee25c7a4b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QG:zCsanOtEvwDpjK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_1d19c9f71952dfd4e27d29b6eda32301_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections