General

  • Target

    2024-02-23_300f2ec5dbe728b7cc5a2bcd53433a0f_cryptolocker

  • Size

    60KB

  • MD5

    300f2ec5dbe728b7cc5a2bcd53433a0f

  • SHA1

    d4097ce268181b3c8899cfb033f3654c65be0f7b

  • SHA256

    0598c5aeeadbdb0d58fb143e8bedb5d3a24fea5e939d56cb674c7119f9ca462b

  • SHA512

    d15e7d796257470d1669251bd7b0c45bba60d83d0f03a7c22dfa9968b32f3b807b12842ff417f0293a6e0ad3de1a9b460031e7ec6aebd843cc5e2155b1a8e2e8

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR8/:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_300f2ec5dbe728b7cc5a2bcd53433a0f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections