General

  • Target

    2024-02-17_0781394cb546a09252f807fae20fd202_cryptolocker

  • Size

    74KB

  • MD5

    0781394cb546a09252f807fae20fd202

  • SHA1

    d58d8345b3c31e8d227ca724a544ed2919e86928

  • SHA256

    331b3adeaa3f89aec73fbb6c0b58ea72ece046c4ca63391a8049ba6defdd7838

  • SHA512

    a6da6509c06e2be36a579e77fd9ce355873705cb036030631700eb7ee8efcf67fc3eb0515a3dde873733203a96010d103f20028a2629b492a2e672f67a097e61

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJc2:T6a+rdOOtEvwDpjNtJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_0781394cb546a09252f807fae20fd202_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections