General

  • Target

    2024-04-28_19efca5cf3bdd9bef505ab3610af2619_cryptolocker

  • Size

    80KB

  • MD5

    19efca5cf3bdd9bef505ab3610af2619

  • SHA1

    14c586c82e04ef2d07d28d28b02856bf1688b9e0

  • SHA256

    fd4fb595b2bd8c87292d2289c6a093d5555b71f5ced1d2f56a560205a9acd7b5

  • SHA512

    e9088e88d60f9dd6a5345e5b8398f5d7591e7f708aa8b1ede7a6914f0f2a3b8a096ecf437d13cca7d17fcd0463492389f20788f5dfc13ea449da8d56b4407732

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Q7:zCsanOtEvwDpj/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_19efca5cf3bdd9bef505ab3610af2619_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections