General

  • Target

    2024-01-29_07e91e4d9bdf2b31c82c9ca49109ace4_cryptolocker

  • Size

    73KB

  • MD5

    07e91e4d9bdf2b31c82c9ca49109ace4

  • SHA1

    0b28845acd68053df210ae2707d1a07edbaba73f

  • SHA256

    836b42c8aab28a4e48dab69b8cc955957645ff370c78584da3e35a160df1489d

  • SHA512

    ed3f949272e1453b5b6ba7f022779325ac287e221426f6ffea99ae292a7dbbac4362ad8858fccb6d0f46b93d76f8498a7d7ce225b6f3bd7d93025b0d2c44cfc0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx8:T6a+rdOOtEvwDpjNtHPL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_07e91e4d9bdf2b31c82c9ca49109ace4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections