General

  • Target

    2024-05-19_cb1b216a979a5bfd78aab33fc17d0f34_cryptolocker

  • Size

    74KB

  • MD5

    cb1b216a979a5bfd78aab33fc17d0f34

  • SHA1

    d44235f9c8a2179db0df2ac6b6db725e17144aa5

  • SHA256

    e6c1e6d8df2536f27e8113e118bc481dc845474c7ca094e7f4baa12e2eb5b889

  • SHA512

    0188d062c46b7ae0023edf0d46e7ba7b01c94d4b3c3b73d0795703f8eb008388aba197dbc19ccba98ff639e27f75a174d12c59729c51c8ddcda7ad751100e922

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gr:1nK6a+qdOOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-19_cb1b216a979a5bfd78aab33fc17d0f34_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections