General

  • Target

    2024-02-13_dfc68a4422144377f4a7e8dab62aef32_cryptolocker

  • Size

    80KB

  • MD5

    dfc68a4422144377f4a7e8dab62aef32

  • SHA1

    e52f5fcd63471fd930d5999cc62505fb17dd8b69

  • SHA256

    efa9a28bda455561043ccddca4fe61d76b4f2dc14d2e2cae7ef96957b8df7d57

  • SHA512

    f467998cae25617f6f440182d29dc7fd29e47f29f686ff3772ea5b84ae37dbbd0968bd723c4af9ae86655d823a761b92f4e17873a15fc5143140f0df1917b734

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0nJ:T6a+rdOOtEvwDpjNtK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_dfc68a4422144377f4a7e8dab62aef32_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections