General

  • Target

    2024-02-27_2fc839c994acf259d6f7d3a925935c09_cryptolocker

  • Size

    104KB

  • MD5

    2fc839c994acf259d6f7d3a925935c09

  • SHA1

    f6d383dcaea8bd56540fdfa104fcdc7c37a65625

  • SHA256

    54e3918e6276e836d2d1482098ec7d874ee66a5fea6a59d802b5ebb959f21747

  • SHA512

    58c9c9416bb27889fb26da2f67021c46a2717ab1b14d25cc24c3a6e7c4ad0050417f1126bdc0fe76430ae639f621dc9cf1a3ebfccbd780bc8d0377d60d5ac8be

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksN:1nK6a+qdOOtEvwDpjN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-27_2fc839c994acf259d6f7d3a925935c09_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections