General

  • Target

    2024-02-25_207d4ad108b7456491ea5edbb4ebe6f1_cryptolocker

  • Size

    92KB

  • MD5

    207d4ad108b7456491ea5edbb4ebe6f1

  • SHA1

    fad8cb6d46c27cb1a32ad5c9d420abff80bbbc3f

  • SHA256

    fdae7bd1bc62b1251589d0bf0f9a2dbb6c94f0a91d289b5b56af6a0d8f8a6190

  • SHA512

    e8f08cf0c4cb66b17791a857607e776fa25f91cb55d4d5762aa30e4fa87113da0d136f6a09a4d01a08605ad9e5e3ec73b5b90b8faf962e5a2dd4679308ac8f8f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/R:zCsanOtEvwDpjBR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_207d4ad108b7456491ea5edbb4ebe6f1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections