General

  • Target

    2024-02-25_84a05cdf3540db30f705e9a4d122dec0_cryptolocker

  • Size

    81KB

  • MD5

    84a05cdf3540db30f705e9a4d122dec0

  • SHA1

    773e99b750994b78b0e8ed775865a8d03ac2d29d

  • SHA256

    99b57f57a10a1142f2397b88af76548c69f4c408aca44521df034a1019a0eaf2

  • SHA512

    dc4f298b8c9b9d972c04004eb28d94bfc9c643502c50425b400f3666a4214a31ada3051a78e7d9f96dc71e351485475e1e56e7b0ee78ccff37285e97cc4f188b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Wlu:T6a+rdOOtEvwDpjNR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_84a05cdf3540db30f705e9a4d122dec0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections