General

  • Target

    2024-02-14_7b45c55f4dd8127539b73612f31a2cb1_cryptolocker

  • Size

    56KB

  • MD5

    7b45c55f4dd8127539b73612f31a2cb1

  • SHA1

    300501e7a549269d14cb23e341e0a3aa66a5b817

  • SHA256

    f87b63921dac7c0d25f270ae32ab9d64827523f897456b2037ee50bf40a2d627

  • SHA512

    9d9ccefdbd5397896d6301fb7b5b3386b4b32cbd6647a1dcbc65ec4334681a84eb4a0b6f65bf395f82374733cebccb2bf5b26dd6132f3007a1f0d88344e30c64

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpyq:zj+soPSMOtEvwDpj4yr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_7b45c55f4dd8127539b73612f31a2cb1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections