General

  • Target

    2024-02-28_2639433a692f6b73f026cfcff6ae71fb_cryptolocker

  • Size

    80KB

  • MD5

    2639433a692f6b73f026cfcff6ae71fb

  • SHA1

    2f0122b03c90dc24b109f31d029afd8ce57d8d78

  • SHA256

    dde28a2f7dc27f671c9f519a16b2c5d51e3a73645e948e6502c55977f6172db6

  • SHA512

    44f6db6b4a4c6b19b0019704b214fea2c11505011433175d948c60f85b3d4bb0a88ee285fd03b447603f128c5d5fa19ffc94bc65f78482517ea63fe8b856f62e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyTg6T:zCsanOtEvwDpja

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_2639433a692f6b73f026cfcff6ae71fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections