General

  • Target

    2024-02-25_153c6a1d195e617fec00a27184c6f972_cryptolocker

  • Size

    74KB

  • MD5

    153c6a1d195e617fec00a27184c6f972

  • SHA1

    46b20a7f640371e435cd7a23601729e1f634d555

  • SHA256

    e9872266efaee557456e5d9fb7cad3bc8b22da5f99608de04d225482fd5de19d

  • SHA512

    fe7a9040d5c07cd9fde9ef44a74c7dcf5ba4c261c19d75698d6500fb417ca67d329580d6a24e79a8e162062825e6556e24f43d047e779b2f7850be629f96f135

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx765:T6a+rdOOtEvwDpjNtHPL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_153c6a1d195e617fec00a27184c6f972_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections