General

  • Target

    2024-02-02_7354ce510f9343885fd668aaf7703149_cryptolocker

  • Size

    116KB

  • MD5

    7354ce510f9343885fd668aaf7703149

  • SHA1

    7298ca21327ad29988201e11a561ff45f54d1778

  • SHA256

    05c6a6ec6b33de4df4340937a81737350196dd1f947861d6f3358e539dd4bb0d

  • SHA512

    bfc12e5b074c31ec013384d9fd9a608fac744e775da7a3929d78ca3c3c36c2d2d87ea7a278e8d21386f6b0fe3c49d59448128e4bdc20a4adb4c751e93e37f501

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01r4:z6a+CdOOtEvwDpjczq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_7354ce510f9343885fd668aaf7703149_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections