General

  • Target

    2024-02-17_964f9d23b8d625425de4826904418603_cryptolocker

  • Size

    79KB

  • MD5

    964f9d23b8d625425de4826904418603

  • SHA1

    611c591900999163695df7cfbe2d47a20f43a46b

  • SHA256

    eaf7a02bc36b7ee8b7cc5fd5577a9b234e2c9ca9c5cedf3ddd15886a779a380b

  • SHA512

    7559c454c2bd1fffb1b03e6852d65f8eedf9d2ad6bbecdebe860fcda22655845e49bb780c41cf37fcdb992a57e6040be542762247b83415ea07329d0d725e255

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdH:T6a+rdOOtEvwDpjNtB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_964f9d23b8d625425de4826904418603_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections