General

  • Target

    2024-02-04_cb92db3c49c0788b4c5d772867def3ad_cryptolocker

  • Size

    69KB

  • MD5

    cb92db3c49c0788b4c5d772867def3ad

  • SHA1

    f5332c723d6ac3b32e92ab0d2e3c4c19538c1d45

  • SHA256

    5001f9f707c47727feee09dfd0d0bc60d20f3b9c3b4df061c7e8683660620b4b

  • SHA512

    57ad99d3c8ce5db1935d00e18c1dc9d81d86da49240ede019ef6f904ee1c6ef101d4d6887e7eebf852f12aca15e80a84e21d2bd364551d5a94848605afe993bd

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBi:z6a+CdOOtEvwDpjQk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_cb92db3c49c0788b4c5d772867def3ad_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections