General

  • Target

    2024-02-27_67a1bfa025f94dfcb6c287843bc2425d_cryptolocker

  • Size

    110KB

  • MD5

    67a1bfa025f94dfcb6c287843bc2425d

  • SHA1

    434a356a646ce1c011b75a92846687189f401aab

  • SHA256

    cb73be00d7d0dc1580d946eb4de6e48d942920b6dfd0be4478ef97ba39575aba

  • SHA512

    3de6bf5665885a3db47f116b3230f7e608b131b3e747dfe33a26ef675d27f2fe726a968b14dfc46246a52e7be3dca1d7fb0f7ca7ae9f62bb595af9e77af19a6e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwMgV:T6a+rdOOtEvwDpjLzR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-27_67a1bfa025f94dfcb6c287843bc2425d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections