General

  • Target

    2024-02-18_7b77965d62321ed3e58a44af59c30aec_cryptolocker

  • Size

    81KB

  • MD5

    7b77965d62321ed3e58a44af59c30aec

  • SHA1

    a55517d357b6a12af83a546acb8c1fd616ae0ae0

  • SHA256

    50a894ab8490f178543f1c9ec10a4676316e97202e5fbed5aa62cfd0e773e77d

  • SHA512

    907255b0715076fb3a87e9390ada2284502f4a6a2277425018a0690ec2380687f63488d648578b4e63b00b9e930c4e5f200aa8becdac0e501a8353740db8bf5e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWZi:T6a+rdOOtEvwDpjNt7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_7b77965d62321ed3e58a44af59c30aec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections