General

  • Target

    2024-02-25_1f7a292b30339d1c909e6941cd725afe_cryptolocker

  • Size

    63KB

  • MD5

    1f7a292b30339d1c909e6941cd725afe

  • SHA1

    7b12f5b9a57b65fe5108858b019bcdf7c43b4fda

  • SHA256

    6254344b2ff2bbdc1f2c428cca8c51d1355a257b9ad5ddde73c5fd3a3f4b6e02

  • SHA512

    64cb9f16cc6f6f585454741a59870c73b5d493f0a9a95cad36e3be827ccd138da745b1427784b117f9dd748e8b7d0a8c286d0afea4af5b3d179e0a780025f885

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UXw:1nK6a+qdOOtEvwDpjV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_1f7a292b30339d1c909e6941cd725afe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections