General

  • Target

    2024-02-12_927a7cc147810ea420b8e53c78ff8a54_cryptolocker

  • Size

    62KB

  • MD5

    927a7cc147810ea420b8e53c78ff8a54

  • SHA1

    f223488a714adf73d0302f31721a7c8483db0396

  • SHA256

    80e5f12e3265cc5b5af2b7da62fd946c3a9993aba21a7984ba5e3c73d3abbbde

  • SHA512

    86106e4cf9e6c1eea06951d46555dae997c6500ade7d529909222fecade6488a0a6b029c4ce1136c460bc7d1171280b2af62882e0d9a3fdbe9321fe7121aa5fe

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVh4Q:zj+soPSMOtEvwDpj4kpmeLmn7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_927a7cc147810ea420b8e53c78ff8a54_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections