General

  • Target

    2024-02-28_84eb035dd7ba9a6e56d8472a3c677927_cryptolocker

  • Size

    81KB

  • MD5

    84eb035dd7ba9a6e56d8472a3c677927

  • SHA1

    d161c3c9b813e545e2b1adf6970e4b0afa7981c7

  • SHA256

    a14e3ff9dd004ebd2f31881b10bbcf468bab6620256251de1770917932326169

  • SHA512

    912c20a956f4d92645a1ec99536b6258ad5639986318426f942f00e35b1cd06a2c14f3ecc92b7e5830d572a3991bbdd4364bbaedfd63efc982a28c2c69c3c1ca

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0j:T6a+rdOOtEvwDpjNtE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_84eb035dd7ba9a6e56d8472a3c677927_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections