General

  • Target

    2024-02-23_0b42731e27d33ef5647bbe4517494489_cryptolocker

  • Size

    63KB

  • MD5

    0b42731e27d33ef5647bbe4517494489

  • SHA1

    aae4f84ebdbdf886ce5d021c886ecbe39d460e50

  • SHA256

    e2ecaec4e427c99f689ca4df81d190a007d9b2a059975f1737861e03f33e5a41

  • SHA512

    709c8e291bf2f3904aa7534bea13c7590b09b61dc208ecddd284b18b279585a99210bd37884fe34cf3e20950cd945bfe09e96cb4d5a99956757258460e38fe71

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UUv:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_0b42731e27d33ef5647bbe4517494489_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections