General

  • Target

    2024-02-28_a8b496b65bb5e8a324d658723212ea64_cryptolocker

  • Size

    120KB

  • MD5

    a8b496b65bb5e8a324d658723212ea64

  • SHA1

    7b392ab225cd62e836cf0ebae7955456f3fc28b8

  • SHA256

    03a58229329596b477dec268fb58bae388636e5700c93e2ebc78a0f9fac0a917

  • SHA512

    4059b3364c2aa278df2b40c0e82f12c1270c8dd8dd0276b7fe67afae5f4f9737e04264803179fbfd3bc3b803d054dcdaa7eb858a9193ceb38cf47b00942ac932

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t30:z6a+CdOOtEvwDpjczJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_a8b496b65bb5e8a324d658723212ea64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections