General

  • Target

    2024-02-23_710ceea7e2cc0a4a13a8d746429c8544_cryptolocker

  • Size

    97KB

  • MD5

    710ceea7e2cc0a4a13a8d746429c8544

  • SHA1

    c7e1569123c4d7df8a1c6e271ea49b92a2710d96

  • SHA256

    1f1c82433a0bdde3ce614d240849382a99f06bbf95d721f9994e8502cb0521ba

  • SHA512

    120f8b89f293ff7fa8218955b90ccf63367992fe6e563534fe0b1608f6d39f3e1500a81fae76d188f73f4fc5094f04d1b7e2f9861232fadd947fd19084258973

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKi:z6a+CdOOtEvwDpjcD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_710ceea7e2cc0a4a13a8d746429c8544_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections