General

  • Target

    2024-02-04_7c995a50be7ab419c85815425ec7b7ac_cryptolocker

  • Size

    65KB

  • MD5

    7c995a50be7ab419c85815425ec7b7ac

  • SHA1

    5a11e03f07a94bab8cf3f95d9dcc7d9a5bb1d45a

  • SHA256

    9650683f0a75d8fccf2c217f7f34116a4e37ae34439edc5ef293cf67f413c8b9

  • SHA512

    fe974eba664e34976154989743be05f1d8501a0afc00263b6e0bb61eadcb7ec6b6d537bd7a3fd9bbc1211aabeec95c7a1d6af8fd4b90ae9b94bf805c27c0b5ca

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1Fb:T6a+rdOOtEvwDpjN7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_7c995a50be7ab419c85815425ec7b7ac_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections