General

  • Target

    2024-01-29_26dc8da0e07b89d3847a858e22c96532_cryptolocker

  • Size

    75KB

  • MD5

    26dc8da0e07b89d3847a858e22c96532

  • SHA1

    9c91eefd27bb9176e03e894b6932bec42ec40263

  • SHA256

    be87e28ef7ad06119932bfe7153b3541fe3ae6738e7cde692cd957570c4f436b

  • SHA512

    505bc08f75ad8d1b5c915fb9477d10e2cbdce5a3930af147a30bf2f669bf9b9e88ecbb7720798658217fe286f15c00fc5bcad4e3b29997c5d78429c08d7bf1c5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdfF:T6a+rdOOtEvwDpjNtb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_26dc8da0e07b89d3847a858e22c96532_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections