General

  • Target

    2024-02-20_7b1cf35963b238a25a46ccfede2aaceb_cryptolocker

  • Size

    61KB

  • MD5

    7b1cf35963b238a25a46ccfede2aaceb

  • SHA1

    ab3ef8521c2701b3836b984f8492be1c33e58cfd

  • SHA256

    d9be430fd319f60f2568b3b3262708717aaa1a04d88d83b22e5c6a7cdbeb8dac

  • SHA512

    6aaa2be97db74dfa193d90df750fafab910e0a6330f9e2f94bd3f5d94fea439d1321a5b4e2780528ef41b69bf28fd4af42416c579fb39de1d9fbe1e9524568a0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY7Dt:1nK6a+qdOOtEvwDpjO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_7b1cf35963b238a25a46ccfede2aaceb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections