General

  • Target

    2024-02-03_78c48c4e1f20df4d396809f08b2326cf_cryptolocker

  • Size

    78KB

  • MD5

    78c48c4e1f20df4d396809f08b2326cf

  • SHA1

    497d78fdc80d485d0a0eba4baadb55be44d8008e

  • SHA256

    f35f4be0f7fb5ba044be4b9ef11609e3ef75666d19910365a036ce307f85b8d4

  • SHA512

    bf57e1041856f0d2cd1a31bf7d322f46e444a0162224166206df0605bbab5b34ebb028469dce9f32cc8f8bc64a1a424bdede4a3d1d7dfa836e4f396998008167

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSP7e:T6a+rdOOtEvwDpjNA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_78c48c4e1f20df4d396809f08b2326cf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections