General

  • Target

    2024-02-25_0a834dfcdf139f4e06b237242a137c78_cryptolocker

  • Size

    120KB

  • MD5

    0a834dfcdf139f4e06b237242a137c78

  • SHA1

    7a5dbe533d5d2cfa3a2d1df70802c0241160d05c

  • SHA256

    04958fec550cc204573b4f88fa9116ca96544777b3fe3f620931d336a97eb87a

  • SHA512

    ce7af707f1c71a769d2154093c0b5b71b0474bd1e36dd66cd40ec065345d6869660650a7443ed031e0665257d8fb82773e71f01baccf0dd0c15a2994823cd1a0

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t3G:z6a+CdOOtEvwDpjczn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_0a834dfcdf139f4e06b237242a137c78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections