General

  • Target

    2024-02-23_78c01449876aa929e305d4931beeaab3_cryptolocker

  • Size

    80KB

  • MD5

    78c01449876aa929e305d4931beeaab3

  • SHA1

    1ac3c17095f704e424d08506ff6727f17396b2a6

  • SHA256

    3b5061072c7bff5779b7f49c89dd1075058e0be07d746e5f418901d9d421870b

  • SHA512

    f78f1509b9f849bc14fca123ed0820ec4676410eade199b79e74f1b3c6a58e6d398f996ce57878e8e48506f464d95e496f744181cc6eec1a12519e81c1fe6ab0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0i5:T6a+rdOOtEvwDpjNtH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_78c01449876aa929e305d4931beeaab3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections