General

  • Target

    2024-02-25_93c7ba2752c7ecf81395e494ea3661a4_cryptolocker

  • Size

    83KB

  • MD5

    93c7ba2752c7ecf81395e494ea3661a4

  • SHA1

    bfcacb448ef1348ad9eb876f2fc4db9839b7ff97

  • SHA256

    e7474e3e79203b934be89c983c4a744c6cf371f2fd181d30bb9bc18135e318b8

  • SHA512

    d3e701d8e5c7cd1b0e23c2df5b7e83339536a5a4bb7cd6d0b18ab1f50060d938f97f128c9919c9958c8cc191477abea32ac1329b446545da5f5ceb393688d3a8

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1nW:zCsanOtEvwDpjQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_93c7ba2752c7ecf81395e494ea3661a4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections