General

  • Target

    2024-02-28_7b8ad27f6b4c0ac499aa6545f3937c99_cryptolocker

  • Size

    117KB

  • MD5

    7b8ad27f6b4c0ac499aa6545f3937c99

  • SHA1

    c0cf6ec4fdf95f06d4ea7e8fb40e78122bc947ec

  • SHA256

    3c160d6078805e14b1c4f18adcbfe90ad2ee011f2104092ee711061e419ff583

  • SHA512

    7a344573101d21cdc27a4f48735c471d7a527260349cb71c964498c4f6d88c6acb55d913b381f00d0fe1f96b595d2d473833a48c33ac83bd4ad02858c73d6643

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01i:z6a+CdOOtEvwDpjcz0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_7b8ad27f6b4c0ac499aa6545f3937c99_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections