General

  • Target

    2024-05-17_16d72fcf19de1182b353434a39fca5e4_cryptolocker

  • Size

    67KB

  • MD5

    16d72fcf19de1182b353434a39fca5e4

  • SHA1

    dbfed8d404a6ec89b9788d83f5bdc0c7fa60d17d

  • SHA256

    8406788a585b486ab3bbdef5b0dc89e245d6d6eccdcb2e91ec0e58761dd1f9aa

  • SHA512

    f7709464f97f4ae6d519928b48144d36411d6595e012cfffad5b3e67b7e9af234ca67af26e0bb4d9936bec77330e61ab8d5417a2ae879eca7a6278c2e879a68f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQR6:1nK6a+qdOOtEvwDpjD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_16d72fcf19de1182b353434a39fca5e4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections