General

  • Target

    2024-02-24_f02637319626910f4a706a7d674cc924_cryptolocker

  • Size

    120KB

  • MD5

    f02637319626910f4a706a7d674cc924

  • SHA1

    faf11ad743a478db457b6d8b9c60b36040b342e8

  • SHA256

    7ddf5cc5f538298a636b270eb33f19539b2d84b25e716e63a0b798f2566476f6

  • SHA512

    076c14ab126940409b5e1d939c73fa0fc79e1d56901b6a460f6cdc220f091977c837c989c18d268d0bde00f700365612adabdf926a218cb1dc04a98c958c8186

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t3i:z6a+CdOOtEvwDpjczr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_f02637319626910f4a706a7d674cc924_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections