General

  • Target

    2024-02-17_abaa5173778c88fd717e810b03cc7543_cryptolocker

  • Size

    116KB

  • MD5

    abaa5173778c88fd717e810b03cc7543

  • SHA1

    4da9b7ee48ecaa2d04a03d4bd564ab700b11741c

  • SHA256

    0b9c148044518fa24f0d2c2165cf7baa48af7803dbeac2c642499c56e958dc92

  • SHA512

    b558d339d8389fa8404d5a3ce5518a4dcefda1fd5a6751eba6d301b4ca6a41f9c5e79ee8edab779532c302947298069726046c2dc704b36ead70a21da0a781a3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp013:z6a+CdOOtEvwDpjczF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_abaa5173778c88fd717e810b03cc7543_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections