General

  • Target

    2024-02-21_f47f2eb91fd7b169aa80e79789b14efb_cryptolocker

  • Size

    81KB

  • MD5

    f47f2eb91fd7b169aa80e79789b14efb

  • SHA1

    a9ccf9a62a4d7c442264222131d19393c6030b85

  • SHA256

    7a0e3a5b606cd3d84d4180bf8fdacfeb59ad9f689fd1bd510f457af191d9b5a7

  • SHA512

    40b557a40d097db3e490425ecd7614371ca44a1140ebc5d47bb1831c5b826e526520935f223e7894e65100c4a3bd6a28583dede8986b1cd173545d8e97080a53

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7q:T6a+rdOOtEvwDpjNe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_f47f2eb91fd7b169aa80e79789b14efb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections