General

  • Target

    2024-02-22_aabc8bda258c074e02261d9dcc7781a8_cryptolocker

  • Size

    82KB

  • MD5

    aabc8bda258c074e02261d9dcc7781a8

  • SHA1

    2310fb66858c3e48112bc83276c9acbbaf1d4a8f

  • SHA256

    c4d285bc1b26eca4463e57eca9c9b44b002ce9b7084a3cc705e54beeef1a5dba

  • SHA512

    a0848a83b88ff5c9b0a8ee765fa851504accbcef8cf13aa07a2ec4da95324e956eea63bd27436839279ed4f19d47454f75532b4fc5f38fc28d2d1044b7d11c7d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT73:T6a+rdOOtEvwDpjNr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_aabc8bda258c074e02261d9dcc7781a8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections