General

  • Target

    2024-02-28_6b03267d14edee8fa73a4d628f4ddaa0_cryptolocker

  • Size

    120KB

  • MD5

    6b03267d14edee8fa73a4d628f4ddaa0

  • SHA1

    3b93e0e1619f7852f51954685ab103b358422621

  • SHA256

    55acccdc197176b93d0e0383492cd643cd539c6f884234e70a9689dd966751c3

  • SHA512

    34e41c86483e71d8c1ae92360ea69377ddfb71c1436a8124dfb9ab7bf09245fff68559bcedff04af8946d728540b747a4341be761f0a98dd888ef44eff8e2592

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t3k:z6a+CdOOtEvwDpjczJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_6b03267d14edee8fa73a4d628f4ddaa0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections