General

  • Target

    2024-02-18_7a658cf15572a2b9f2171663d5eecffa_cryptolocker

  • Size

    97KB

  • MD5

    7a658cf15572a2b9f2171663d5eecffa

  • SHA1

    10815d0b11e44365dddefea1a261050ee8ae2e6f

  • SHA256

    fbcd6c21b35e4de0250df12a4eefa841a9e6635dd0939af7e023be980dd0c4f2

  • SHA512

    c657a79ab7c401b9cb07c1a0b5a2fde5d9e5a9e36d14abbd04723b6efa8b65fe5b2f13ab5e92709684f707493c41dd087af4584f9dd468b6579208f11062a496

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BI:z6a+CdOOtEvwDpjcm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_7a658cf15572a2b9f2171663d5eecffa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections