General

  • Target

    2024-01-23_878fccd9a21632c0c67924a40baa6d3e_cryptolocker

  • Size

    80KB

  • MD5

    878fccd9a21632c0c67924a40baa6d3e

  • SHA1

    fb10e12d40dee8275a68c907391c29886e2fa0b9

  • SHA256

    1590b4ed6908c7b23647fe25d32137afc512f7c45980a67b0a7c3f3d51ec04f7

  • SHA512

    6539640c7a7b40e569bb18d08d292b1a57bd21d0cb0e577ceb2b77ea00d7ff14c0eaef6a5d51f4666537df11685d4da2076b430033fab2ba8e91b33744d3fb98

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdei:T6a+rdOOtEvwDpjNtT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_878fccd9a21632c0c67924a40baa6d3e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections