General

  • Target

    2024-02-23_0e280f302f2616a40f403b74b37283ec_cryptolocker

  • Size

    77KB

  • MD5

    0e280f302f2616a40f403b74b37283ec

  • SHA1

    1d2106cc5672cec3b912487d26a84a3adfa38ab4

  • SHA256

    732766049d51b60adfa551108a8935376ffe2b1d0c19bdc3309507e96768b0cd

  • SHA512

    52e245361bece36586f6d1caa2427375305744beaaf04366d0ee8503514f78c8da1ddce18a1be544ea0ca606fb93bc09396ee821976bb4456294d3327f60a373

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuc:T6a+rdOOtEvwDpjNcC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_0e280f302f2616a40f403b74b37283ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections