General

  • Target

    2024-02-18_cf7af9e9a989c32c9390d9a841015aaf_cryptolocker

  • Size

    80KB

  • MD5

    cf7af9e9a989c32c9390d9a841015aaf

  • SHA1

    2c22b7de57c14ba63078a94fe7789bafc5fdd392

  • SHA256

    4e7a8cb290454d9636b6e65dfe5d10cebb0751b7afc50b6c0619693641f4452c

  • SHA512

    8bb3edb4c073f260dcf6935c728ff058de1a5417ac2d3fd2325ac2670ad8b20d1266051cb64b18e92a3d8463b4b4fe248c738f970a0fb593eb40d3ba658332d0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS15h:zCsanOtEvwDpjV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_cf7af9e9a989c32c9390d9a841015aaf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections