General

  • Target

    2024-02-12_378c7445bbbcfeb3f072f9142f9b0d18_cryptolocker

  • Size

    62KB

  • MD5

    378c7445bbbcfeb3f072f9142f9b0d18

  • SHA1

    b3a27e3b870e1ee4a96f95eff5e98ac53528af03

  • SHA256

    be03b4c5211dc4f9f8f335b63f4b9035d282d9567234e9e24ed84e859d5522e4

  • SHA512

    8a11c2cbec4db20d49b24e2b822ffef7f99551c743cb9e31348c0d7ada6611c71b61dd74a4b58e4bb55a7d4ba03409286034c0534f3dfc1e9d38cbd9f74f0325

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoi:1nK6a+qdOOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_378c7445bbbcfeb3f072f9142f9b0d18_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections