General

  • Target

    2024-04-23_17a93cbecc7eb100a7a1573c794d0859_cryptolocker

  • Size

    88KB

  • MD5

    17a93cbecc7eb100a7a1573c794d0859

  • SHA1

    67e2d53b8ea5a950b546b6959b5286f11dd07eb7

  • SHA256

    62d140a6f37eac11e861e2fda938cce68dd76ef3716933cf039e6a17210a3f7d

  • SHA512

    8aa7e6909a8e12b800275db89292fd40d2afdb09408031248b8ec2bf0064d2551a31ecede59e0c2309e9c72d546fd658c4d94e8341857ea94baf2869ea449099

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblR:zCsanOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_17a93cbecc7eb100a7a1573c794d0859_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections