General

  • Target

    2024-02-24_b76ddeb3a95acc2aba90e63956e1a779_cryptolocker

  • Size

    78KB

  • MD5

    b76ddeb3a95acc2aba90e63956e1a779

  • SHA1

    362e8fd3d389a2bfb0daab2a8fa6208705a96e9f

  • SHA256

    5872256b36c763f2c9d261aebfa6a179194c7ea16b880c5531964939b57ddbb7

  • SHA512

    af73e64605bedb2d7d0b31951b5a1b5291ac58875d8b423ca01f2a91594feeb4cf83ccb1ca7d6ddb686a4ae4cd52027767b658558d9f756af0bd73f33c2d5853

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSP7g:T6a+rdOOtEvwDpjNO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_b76ddeb3a95acc2aba90e63956e1a779_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections