General

  • Target

    2024-02-28_95ae301d16e803f89fe8e8c69baafe97_cryptolocker

  • Size

    109KB

  • MD5

    95ae301d16e803f89fe8e8c69baafe97

  • SHA1

    3dc1173726e7593acf4693428d78f792f2a02a54

  • SHA256

    a3c7b902173bf0d25031167510115c7b8536653672e3fa8f784a4e62c927e841

  • SHA512

    5b44f3ec2a339e5518c7af2af14963da94ca6e29ec43a981da0011058b926922158a58d3d5be07bbc703e6f2fb83f14b9013dcd6bcf73061492a71e7c898c786

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMg8M:z6a+CdOOtEvwDpjczp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_95ae301d16e803f89fe8e8c69baafe97_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections