General

  • Target

    2024-02-23_a67a0be11ad057cfc7a124f231dcc922_cryptolocker

  • Size

    117KB

  • MD5

    a67a0be11ad057cfc7a124f231dcc922

  • SHA1

    b517aa93c42c5bc6976e2681c5f39666af0f883a

  • SHA256

    b3847bb306dee3b5c129671b7b72267baeb07f5e5756fe544c0acd05b8f2f9d4

  • SHA512

    80a1c3cbb12fe09c851ad865a34a1d6a3225bbb3a62c95edbc4abaa5f72e527d598917d4becdb6776b0ace3d4f38a9068f8249d229638f94a3f046c852234304

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01ZNn:z6a+CdOOtEvwDpjczB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_a67a0be11ad057cfc7a124f231dcc922_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections