General

  • Target

    2024-01-29_0e667b6477166a0c8c0cb6ba187e901a_cryptolocker

  • Size

    105KB

  • MD5

    0e667b6477166a0c8c0cb6ba187e901a

  • SHA1

    894c3c70c84c18663206260ae534707de2862aed

  • SHA256

    8a06a4b9be9f3ddb2b6b65caee997f5a275014534b1f51c5745213f3206377c1

  • SHA512

    7322ae8f32b591da5dc828b769dd05ec2e6a20a49fd00077e822ee34aa7684730a13d093c71b6c11afb150482176870cba9337d8705572327c02736bcf5ca9f5

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkslLl:1nK6a+qdOOtEvwDpjz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_0e667b6477166a0c8c0cb6ba187e901a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections