General

  • Target

    2024-02-28_d206b876fd5849fe0518c8abdddc1aee_cryptolocker

  • Size

    92KB

  • MD5

    d206b876fd5849fe0518c8abdddc1aee

  • SHA1

    aedfb214dad4b4905a6a9909d71c41dde2285805

  • SHA256

    88df7e63b74a4e66c967dbdb00b96c5e01484db0ff299179c767bf8e2ef08069

  • SHA512

    7185513caff23049a4ea8675281e9ad2205a2a71439b3fa18f135df29577006fb0fd77c181c7c6b40b5c3f08032aba02039b0d950a591b3dabd1e66664a63479

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87UvTt4:zCsanOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_d206b876fd5849fe0518c8abdddc1aee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections