General

  • Target

    2024-04-17_dc850159d6304f5fac35c7614b52a1ee_cryptolocker

  • Size

    88KB

  • MD5

    dc850159d6304f5fac35c7614b52a1ee

  • SHA1

    91bff5081b2b24817e22203940d6cfd4f64772aa

  • SHA256

    0587f3fcd968678c3c1d4a6b26261d73fd6ce92f35089d8ed018ad42a618429e

  • SHA512

    9b8dba2a096d5b406a8c97e919996a405aac2a84deabc46716bd0a2926c018cf453bf45279401660a74778086a15ac140f2db4605cf62349ebc33934329b3315

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAG:n6a+1SEOtEvwDpjYYvQd2PG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_dc850159d6304f5fac35c7614b52a1ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections