General

  • Target

    2024-01-28_206f0e2e857c6b7b4a3d7c1bb7c97367_cryptolocker

  • Size

    116KB

  • MD5

    206f0e2e857c6b7b4a3d7c1bb7c97367

  • SHA1

    7d4aff39d49278b9d80d45405495c07502835802

  • SHA256

    b300554045cc59d029edd00507b91eeb61d760e62c798c94bad85897be51b967

  • SHA512

    036606009853f5f9a1bdd01afcd29f91005321d83cf28d95fb7a2f2ae6922a840e0f8df33d8574fdd698126b392016a8160ba8fc9ab11865fa3075c32a1bb854

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01C:z6a+CdOOtEvwDpjczU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_206f0e2e857c6b7b4a3d7c1bb7c97367_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections