General

  • Target

    2024-04-17_1c61cef3b58cacd553e6d4512d802b6b_cryptolocker

  • Size

    96KB

  • MD5

    1c61cef3b58cacd553e6d4512d802b6b

  • SHA1

    906d9b5f5f0a3f7ade8f7bbad8d074235c8c5f21

  • SHA256

    3092f3284343678b844764329a387690abcbf34c8d17976f8e47f182d7c27719

  • SHA512

    8d132624c20099a46261baa1da86930d198b24c9116de23fb2053a37897fa4845109bcd1fc0dcb9866b27469e0ada9e3ffdb9b292f657ef74fcd39c40846ec11

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bDc:zCsanOtEvwDpjBc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_1c61cef3b58cacd553e6d4512d802b6b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections