General

  • Target

    2024-01-28_a4ff42ff72abf7e7adcfe39060a7646e_cryptolocker

  • Size

    73KB

  • MD5

    a4ff42ff72abf7e7adcfe39060a7646e

  • SHA1

    f7d096bd8840a27f6c655a4518c335ceb823de30

  • SHA256

    eba5dd127cc4c5adf1531da297b1d83c9fbab0edfedec86a79e7908bd24c2f9b

  • SHA512

    e85bdc02c0966d8aa5e4e169730c3ae95451cb44546b8fd6ef8b74bceadec6a0509818700f6f6f0747e989447d566c8623d7c35a91c65f43e17cd5c3a5199b14

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4U:T6a+rdOOtEvwDpjNtHP8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_a4ff42ff72abf7e7adcfe39060a7646e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections