General

  • Target

    2024-02-22_cf1abd255fdeb821776906f72790f737_cryptolocker

  • Size

    57KB

  • MD5

    cf1abd255fdeb821776906f72790f737

  • SHA1

    eb1859bb2468bf03f3f09eb0a027ab9e6a8424a2

  • SHA256

    681ccfa9e365849051623eab70f6cc9535ba5149f52f1caf0da4eba069f1b9ec

  • SHA512

    942040097fc1c57fd3f4f688d49e45cb4e3befa66675df2693fc341d0a92c200b03f316ab7926fdd0c773bbda9647cdf7ba5eaef75d91d063107857c05a23eff

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5app169:z6QFElP6n+gKmddpMOtEvwDpj9aYaS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_cf1abd255fdeb821776906f72790f737_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections