General

  • Target

    2024-02-14_cabbb3e06af67fc1875f5cf4d770c100_cryptolocker

  • Size

    115KB

  • MD5

    cabbb3e06af67fc1875f5cf4d770c100

  • SHA1

    561df5ce7ecac23b4e0e6a40d273a447a4b50950

  • SHA256

    e7312832c222cbbf1a19dade045444b7836aea2e79afcef12106535ad10d646a

  • SHA512

    55028c9f446f57e0a370e9c9afa639f1f256bc7d34ce74030e92d28e08adf7e574a306f0c974c6b7300ddfc7fa6a9ec76bb09e4a17cb5b0abc91dfefd605f862

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9G:T6a+rdOOtEvwDpjLzy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_cabbb3e06af67fc1875f5cf4d770c100_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections