General

  • Target

    2024-02-28_271d44d45ec6bcd1ffe11cc2c305d40c_cryptolocker

  • Size

    75KB

  • MD5

    271d44d45ec6bcd1ffe11cc2c305d40c

  • SHA1

    3f0ca0f8aa0977635e665ade1502ef912b2b927b

  • SHA256

    283b6f6ef68a8d7aa9f276c534360354d36fd456eea6cd09d24f24ad54fa15c2

  • SHA512

    0625b5a4635e97fa3fe7ec9d6390eaca6ef76d4b9d7aa94f0796562f0a37255d4771136a2a008221cbace183b26fb92d2cb148fe299c0e8651faa7bf82b3842a

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx7lx:T6a+rdOOtEvwDpjNtHPQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_271d44d45ec6bcd1ffe11cc2c305d40c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections