General

  • Target

    2024-04-20_69c036eb200d01b79aff7a6a1943e2de_cryptolocker

  • Size

    86KB

  • MD5

    69c036eb200d01b79aff7a6a1943e2de

  • SHA1

    1ab655f0bc676fb12f6d54594d1e6473f586947f

  • SHA256

    85a5a8d5cadff3d6d4a8bcaa3d6b5fcaa642618dd78c7aa4493e3538d91f2716

  • SHA512

    d8bf3d60bea904678ce491708aca4e22f668643759724118f49f5e770ac1222f8ff316a6dc755ac4724452e0273783d2fc7159f22f55bb5138fdf7b7d5b47fcc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1/3p:zCsanOtEvwDpjr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_69c036eb200d01b79aff7a6a1943e2de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections