General

  • Target

    2024-02-23_cab80300cfa4d75aab70544913df5406_cryptolocker

  • Size

    62KB

  • MD5

    cab80300cfa4d75aab70544913df5406

  • SHA1

    489ac399521274d7aa1daea3cac0f058961d06ba

  • SHA256

    fadcca168144b46c27b149becadf60b2beee66c7c8c6d7309cc0d98c5e042f71

  • SHA512

    fa29750db4c86cf0eb7165614588db5fb9d250a6707b0e90cec4aa0bbffa74faa14a240328c2d46b9d860a74ddd7c579d46f0049f06ed72cd9a375c6184bf3c4

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVuT:zj+soPSMOtEvwDpj4kpmeLmncT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_cab80300cfa4d75aab70544913df5406_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections