General

  • Target

    2024-02-20_72a48c6349e8451ee0764d33f0a61299_cryptolocker

  • Size

    81KB

  • MD5

    72a48c6349e8451ee0764d33f0a61299

  • SHA1

    0a72838d8c7138af62b4baccdcfa9c9e427396b0

  • SHA256

    1bb9db019c8c95b89e22580c158d89e90ce8ef4660ed2f495780c8da5d1e8669

  • SHA512

    9a7395c89a5faa6841b682b7d6b37a5441d4411067571ce44e0eb7ebfd9d2dc8091cedd1a4428aba4d0f05b760047664d980f1169f633fdea76fd71658549602

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWZL:T6a+rdOOtEvwDpjNtK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_72a48c6349e8451ee0764d33f0a61299_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections