General

  • Target

    2024-02-23_ba571c9e0e7f8ada58e9cadbcced0b97_cryptolocker

  • Size

    81KB

  • MD5

    ba571c9e0e7f8ada58e9cadbcced0b97

  • SHA1

    acb8b680f925af77bd6025a68bf805090b0e6cea

  • SHA256

    7c4a7cf1465e5d100cd7d89f04aa83048b96152c413396d4393211aba81a90c6

  • SHA512

    57b5e6af808cbf331766f3dd8136a4dd4a7b1fdbce19d02e6eb75c347b41402ee16ab0fc2d8c23d48012241ef1bcea3e1140f1d7f28571249fb2b9b8c151b993

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2N:zCsanOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_ba571c9e0e7f8ada58e9cadbcced0b97_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections