General

  • Target

    2024-02-21_aa533cb9b4e03e388ac3033f7cb78fec_cryptolocker

  • Size

    63KB

  • MD5

    aa533cb9b4e03e388ac3033f7cb78fec

  • SHA1

    f368ca94ec3f8a2077a4e8a071efb51009cf35ad

  • SHA256

    2ac1c9bd7e886b9f548578249003a004bcc682d1051bcbc5ac387a95ff017c7b

  • SHA512

    cdd0574b2310766d079e28507e322043662f35a410e974b499d332b595abab642e860f705aa3b2578c611c90fb8ced171422fedd25e62f7ed1934a5bcfc51795

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo5i:1nK6a+qdOOtEvwDpji

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_aa533cb9b4e03e388ac3033f7cb78fec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections