General

  • Target

    2024-01-27_322fe5dd778d82df565d8c11a42d0f21_cryptolocker

  • Size

    106KB

  • MD5

    322fe5dd778d82df565d8c11a42d0f21

  • SHA1

    54fa979014bc81ffa410e2f62f1b59616e3fb06f

  • SHA256

    7546577c79de89a725aafda303a7d71e21367479939741df44232ed2c9799b79

  • SHA512

    7ef86e3614e801e3497bd91f893fbae249bea6dab682e66f21708066f5ebb1419019caf79af110a70d8935d15d1805aaf07a7a4e05009646ed2e683acaee76fc

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksgEn:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_322fe5dd778d82df565d8c11a42d0f21_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections