General

  • Target

    2024-02-22_0a877aa7340771d8f36dfde3f2371340_cryptolocker

  • Size

    148KB

  • MD5

    0a877aa7340771d8f36dfde3f2371340

  • SHA1

    c793cc289ba563c3b663a1b4ef0acb0a062c454a

  • SHA256

    42b8e4b5204351eb9e4cfaf01434d97952385a572a41b4274d8194aee7fe2fba

  • SHA512

    4418df353aded43fed1a06da2d3d8e4ac2647846c6860ce714a2ff38804fcfa0b644dbe41700518f65879324436069293e3cfdaca9c82e27588dcf7653478065

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1e2l:z6a+CdOOtEvwDpjcz2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_0a877aa7340771d8f36dfde3f2371340_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections