General

  • Target

    2024-01-29_28c4976e233a98c1de918b3633b4052e_cryptolocker

  • Size

    74KB

  • MD5

    28c4976e233a98c1de918b3633b4052e

  • SHA1

    d4147e505359d5d3a2e6b1653da6627a9a64f15b

  • SHA256

    8851e39f63f0dc4d978ca0a07559d2f26595372f4f7371875cf5f44ec1d6f1b0

  • SHA512

    8659b1320f79bc80a23a6f59720569c76d455f3783b57840b3ee6557922ef996748802473bb34fa88b58f20336fce9d0b1043f917efbae7fa89a18a1609b8146

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4a:T6a+rdOOtEvwDpjNtHPy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_28c4976e233a98c1de918b3633b4052e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections