General

  • Target

    2024-02-27_1b00124d609b5b77b04e6b37d4efda54_cryptolocker

  • Size

    93KB

  • MD5

    1b00124d609b5b77b04e6b37d4efda54

  • SHA1

    12f483d0825d0357a2514b721ed829cd8f7400ef

  • SHA256

    96af33551f45ceb7b26d8fc4406e902ca83261b68f38401541f73bbe55b5e2ff

  • SHA512

    9ecc29ca1bbb647ef82638d7664e21eea48eb28d4d844c29a2ba95ccbf5443f80b736f912193bb9713acbf0da99f5b9f18bcd8af9a7ffd08a5f0a5ac6b2c5790

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/TD:zCsanOtEvwDpjB/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-27_1b00124d609b5b77b04e6b37d4efda54_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections