General

  • Target

    2024-05-25_8c356f66143e4def25cb3bd0b3a7e44b_cryptolocker

  • Size

    67KB

  • MD5

    8c356f66143e4def25cb3bd0b3a7e44b

  • SHA1

    2ed2fcc43146980909a82b69fb536874ca319c19

  • SHA256

    26735c81702c93604b278146a5666bd5a30d7e0f41fc0ae897ebc19a6934afe4

  • SHA512

    b501c35d5b60e47277212cc29f4dafbae2ab30e6e8f959d614f962b30ea5958373e3108df86dfff012f578675d921d19c321a48d303c90c6dba32b35cb4fd29f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRI:1nK6a+qdOOtEvwDpjF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-25_8c356f66143e4def25cb3bd0b3a7e44b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections