General

  • Target

    2024-02-01_078c9d5c9337a3e38a59ac5a272769c2_cryptolocker

  • Size

    64KB

  • MD5

    078c9d5c9337a3e38a59ac5a272769c2

  • SHA1

    34589c368861e8ea5c6c2ce87916d2ce34edc0e0

  • SHA256

    8a9f9b13913fead9b2a1a15640675a4f56b70a45245ae2482c532b1ac851f6a3

  • SHA512

    df74cb59ee4fe12a5ef9a33d4171d9cdffb7a85f780a3c7746ca9675e8b042da6b7ca9ff335370c781dfdb044ded2efe0041f191226f8d292aeb16162291cfe8

  • SSDEEP

    384:z0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26JWFQRYkW0NrD5v6ntOOtEvwDpjqIGa:zQz7yVEhs9+80JP6ntOOtEvwDpjF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_078c9d5c9337a3e38a59ac5a272769c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections