General

  • Target

    2024-02-19_862fc434f3538c5442f083b4ea2f287f_cryptolocker

  • Size

    83KB

  • MD5

    862fc434f3538c5442f083b4ea2f287f

  • SHA1

    778a20d28662e1d53bc77fbe987d5f1affa83c79

  • SHA256

    4d52707cad049750388da6bec8fe06f098be4591ad25b02a3cac104c1c8f661e

  • SHA512

    78516e1ce01659c8c45a640e2687ce8059de22350bcb8017c80c34b9cd12c4a1cd42614b2b8bc2f78c1fb6b5173d19c862257c1746b77fea5dabb5d9640b490c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1LN:zCsanOtEvwDpjL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_862fc434f3538c5442f083b4ea2f287f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections