General

  • Target

    2024-02-25_ff22ace6be57954b60291201fa6e7a57_cryptolocker

  • Size

    119KB

  • MD5

    ff22ace6be57954b60291201fa6e7a57

  • SHA1

    cb5d201b30cf369f4f60695d2e9fa4e2bc3d614e

  • SHA256

    35cb1511e1623643787ac11c124e79ee3758775cd4bc78682327203b96d1fb5e

  • SHA512

    cbbbf7a9ebddcba9b89cc82bfc629dddd90e2ea69277a4286786e00c3dad1b1fbccf0648f023b588a2c0bce44e3b5c7ddcf1bbcaed3e8aa5d99f2b2ca2aed6f3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01QaGs:z6a+CdOOtEvwDpjczl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_ff22ace6be57954b60291201fa6e7a57_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections