General

  • Target

    2024-02-23_c7bde76d3cc164f2ee0b14be066f9419_cryptolocker

  • Size

    78KB

  • MD5

    c7bde76d3cc164f2ee0b14be066f9419

  • SHA1

    2ca85a8908a822ec1fdf03c2de209c1bec885e98

  • SHA256

    1317f51e731a83731b205163062bfc87ce1ec176e87cbd68d85d8c44b91ec9b2

  • SHA512

    68280f1b16a2eed0ed7ec9a812484eacd5247f6aa65b15ac9e839e5283e4f4ddda5ef77adf99054eee09481af7384a1f7c04358bc24014c8e0006ff811d738d6

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuj:T6a+rdOOtEvwDpjNcJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_c7bde76d3cc164f2ee0b14be066f9419_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections