General

  • Target

    2024-01-27_84f0ea6f09f967100dbcae4d1539a7ed_cryptolocker

  • Size

    77KB

  • MD5

    84f0ea6f09f967100dbcae4d1539a7ed

  • SHA1

    1210c6bbac450f032850526418d60679f0ad1225

  • SHA256

    24c83402ed562b6a582007953a722266788d0be0714f965825628674b3443c8f

  • SHA512

    db7c66a28d976e1d458da8bcb90128ac90c59c63148151a30d3dca304be954a47c18068a0d710000a77d0a111b39285d940a66965ad120b3d33f8bafdb62d0e2

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qpp:zCsanOtEvwDpjj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_84f0ea6f09f967100dbcae4d1539a7ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections