General

  • Target

    2024-02-01_c728e5861ed36b52ca50ba88773b9862_cryptolocker

  • Size

    81KB

  • MD5

    c728e5861ed36b52ca50ba88773b9862

  • SHA1

    2fb175a4386eeb55b0820659047a4cab95d2fb94

  • SHA256

    6d9ab5f5b0a7e192026b10a8f368b7a7cc17adec99a1873bb8f607072630949f

  • SHA512

    b18caf47fe5ab381b3fbbcb08d48442e345e920b18bec69841f653ca796b1e229523c4176c044dcdcc25beda416fbb9d053766ab5cd5f695bc95903223674a60

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7WAb:T6a+rdOOtEvwDpjNX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_c728e5861ed36b52ca50ba88773b9862_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections