General

  • Target

    2024-02-28_287fb6336639474396e1053f3209bedf_cryptolocker

  • Size

    81KB

  • MD5

    287fb6336639474396e1053f3209bedf

  • SHA1

    7ced3136abcbe37650bc59c92463143d31d75528

  • SHA256

    acd3339318827b43e3ce387b3adf3aa86e7aea48137838cfbd9ec7c5d76a7203

  • SHA512

    a0e843b198b1380c2088b6c6d276cc3fc6203c32ca11d272e76428c5ac1845b4c07ccf14d6fbac3dfdaac8b2009e0767179a4ce640259a11246bd0567e9ec058

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdeS8:T6a+rdOOtEvwDpjNtY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_287fb6336639474396e1053f3209bedf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections