General

  • Target

    2024-02-24_f7dbe353e1a246865cc366812c00d8bc_cryptolocker

  • Size

    117KB

  • MD5

    f7dbe353e1a246865cc366812c00d8bc

  • SHA1

    aa8255750aa2b5b166de894ed6eb0075246fb159

  • SHA256

    ae2b45c0c578363f0f3fd3b3cba17a5b6da880767a64960c753134f0eab1d0d6

  • SHA512

    c07155e47d5a65648f8b8d41ba28dfb90d38b657093e4f15673539b7ad922dc4ed845b46d03be9b0aa3d1cc02403bacdc43569401e02586cb815ac4e3bd58ddd

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Zo:z6a+CdOOtEvwDpjcz0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_f7dbe353e1a246865cc366812c00d8bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections