General

  • Target

    2024-06-04_c19f1e5729ead9161fcc4844395095b6_cryptolocker

  • Size

    81KB

  • MD5

    c19f1e5729ead9161fcc4844395095b6

  • SHA1

    c42d115322566f940a5842b418a2e0e3d56bc763

  • SHA256

    d1caeebd9ef2ec6da2ff4139b1ef03df8b8cb55e3a1d9d2fbe28e78665f8899a

  • SHA512

    5c0d9d565a58fbe2c1e8070fd7258086c71557991dfce32177a89ef470c63d3955ca5bb43bea42554585ce88bda37cb1fbdb72520dc0f7cf3c5796cb567efdb4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qc:zCsanOtEvwDpj4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_c19f1e5729ead9161fcc4844395095b6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections