General

  • Target

    2024-02-28_70b56b6f554986fd0e86e294a73420dc_cryptolocker

  • Size

    117KB

  • MD5

    70b56b6f554986fd0e86e294a73420dc

  • SHA1

    6e528b05a59cbb084bc76c890c65a9ac06788ef7

  • SHA256

    5cecdd5a3c0ffe4f9595eaf82dbdaa2bf9a658bf26a2988ead0c50c4de95f7c6

  • SHA512

    d4b54f40b4ba5402118330fe31353d3ff6a5ff779552d21ce26b9bc0a5040ffaefde5b04f06d8295fc0473b0c35843595da2968d0ee524f76c9ae36c4474c2d1

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01kQW:z6a+CdOOtEvwDpjcza

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_70b56b6f554986fd0e86e294a73420dc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections