General

  • Target

    2024-02-04_27e3ee40a95a76b7e4f23410f8a3dea4_cryptolocker

  • Size

    61KB

  • MD5

    27e3ee40a95a76b7e4f23410f8a3dea4

  • SHA1

    25d6ae06ce5be1e3f6ffebc7ee5ea83606921443

  • SHA256

    f95e6186c4f1fc60a7f560b98bc854e6d488dc3c74bcbc8468c7c619abfbef41

  • SHA512

    811cc176bdf4c42542202c3f33704b631760cb6634460602c4110a42778a7a996681355e3d5af04aa6cfc961218b15bf65de50192044bdf5bf29befd81b98821

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVO:zj+soPSMOtEvwDpj4kpmeLmno

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_27e3ee40a95a76b7e4f23410f8a3dea4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections