General

  • Target

    2024-02-21_34ac5ed769352acb8fbc747310f3982a_cryptolocker

  • Size

    116KB

  • MD5

    34ac5ed769352acb8fbc747310f3982a

  • SHA1

    2258329e8bffbfe6a72a9be5e8c5a2ed9372e15c

  • SHA256

    3949175aa121390f9e0ae82b359e83b232ba30dd85dc5fb4c24a617bca8fc055

  • SHA512

    a23aae401a4d833dbbf561904fb2d7b7f77e75cd0bd77fe81587b243bc78665dab7bcf7b3de542594031079d270be6212f1d87c383fb0ef80e797a54f10c6449

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01nt:z6a+CdOOtEvwDpjczP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_34ac5ed769352acb8fbc747310f3982a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections