General

  • Target

    2024-02-23_7f61bfb6a3e953d887146ae0503b3a00_cryptolocker

  • Size

    67KB

  • MD5

    7f61bfb6a3e953d887146ae0503b3a00

  • SHA1

    d2cb83112f1f999060dd31d7cf0504a26ecdd32b

  • SHA256

    ee5914376e3b12b97c76b5750c7988d4e790292eeae9805bf3029d94e1dd2246

  • SHA512

    d5747750bee7e3321932034529c91131aa65274de2199cffb9c1d0fe1fbb2195c18cd6f1715b74e4414d7ca432fd704bd8e8d4938d2c887cd71ccad3b2cd9e61

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB6:z6a+CdOOtEvwDpjQs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_7f61bfb6a3e953d887146ae0503b3a00_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections