General

  • Target

    2024-02-14_cba0ac2eb4f820ba7e10b0878f87d24f_cryptolocker

  • Size

    80KB

  • MD5

    cba0ac2eb4f820ba7e10b0878f87d24f

  • SHA1

    22bca0700721e48b3e0f7f9c33b9da9a7807d9cf

  • SHA256

    4f617f63483dc8d4eecf70ab08f872096ccef2b891a2e7eae320fc2649c0eb8e

  • SHA512

    3ec5da73a092fe5c110d42f523ecbdda4c66af8d5697aae3ce27903a80a9a6099caab960c377e348f4f9ef77e43488fa01734a9696530b2eb8d77088d9ae4945

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWH:T6a+rdOOtEvwDpjNts

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_cba0ac2eb4f820ba7e10b0878f87d24f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections