General

  • Target

    2024-02-04_76dd3ed9c264d3375e781b3003ea22c2_cryptolocker

  • Size

    115KB

  • MD5

    76dd3ed9c264d3375e781b3003ea22c2

  • SHA1

    233bd40443e81b48cfad5b07ddcd551bdb233c10

  • SHA256

    4444bbdcb40660bd3f0a46af20cfcbc0d8e1c891cabc0430cf9adb934c771fcc

  • SHA512

    b80e8d911513c80c880602a52103561ed6312cb6703e62f8b5e036f5338843bc5cc108456b10546fc3b2bdcf3eb2646c31caa7255f78d71b05ce3c2cb4bb5abd

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/c6:T6a+rdOOtEvwDpjLzM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_76dd3ed9c264d3375e781b3003ea22c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections