General

  • Target

    2024-02-19_79379867d9e75f31be377b09cffb22a8_cryptolocker

  • Size

    77KB

  • MD5

    79379867d9e75f31be377b09cffb22a8

  • SHA1

    9af633ee22d191eb6b0cf26d63d5f06a91d65688

  • SHA256

    f73f627bb1a9df04a5d3d2fc0339042d4bd9a3b80237d16d6b7b53a519759759

  • SHA512

    fc78e88c0b8858b3e2733ecc94d3ed0d6c40eeea524e268fd77302305d0929363a85fd56a9a7e9b54284fa9b932f0e7ebd7c697c32de4c7f65064980b804b34e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPup:T6a+rdOOtEvwDpjNcT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_79379867d9e75f31be377b09cffb22a8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections