General

  • Target

    2024-02-24_f5bd26caa235a0f6695aca716d5a3686_cryptolocker

  • Size

    74KB

  • MD5

    f5bd26caa235a0f6695aca716d5a3686

  • SHA1

    806e1f32b22e80c6a13e3994c73786626c9d7816

  • SHA256

    300e6f80d014e68a7dc3522fb00ae8a295b6cfdd022a348934d1d9618ebea559

  • SHA512

    f3e3b58581ae3018714228ed72f403c455c5685b76a44a50e795af1f84d785e5b6b53b8aec27a2bd549bc0062ea10e22748b5f873845c474b908a21db6108a52

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxr:T6a+rdOOtEvwDpjNtHPE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_f5bd26caa235a0f6695aca716d5a3686_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections