General

  • Target

    2024-02-19_780fa45920b14aa25a534b3b6cef53cb_cryptolocker

  • Size

    81KB

  • MD5

    780fa45920b14aa25a534b3b6cef53cb

  • SHA1

    dca4656dce81d811e77ef15ee39eedc4f46024d1

  • SHA256

    829f7d9cf105a02970f39201e77797daed8f9c2092561de75bcd5441ed556bb8

  • SHA512

    e387299254c3aa05ac5e6c455af17b13a25c111c7cbff821bbf497476fa6adf02f8364e2fc07a3532cb51b17257e337e8ae266d2d47b3237a5124b2fa3e80a8d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWZo:T6a+rdOOtEvwDpjNtd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_780fa45920b14aa25a534b3b6cef53cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections