General

  • Target

    2024-02-28_ac3ec424c7849acc029b57c5d9bea1da_cryptolocker

  • Size

    87KB

  • MD5

    ac3ec424c7849acc029b57c5d9bea1da

  • SHA1

    3a07fd35e89014becfedcece9c37b6bd3a42d0d8

  • SHA256

    d403d0ae89558d52d9d5b65c194d9f1ddaa29e912285a399228b923e30b5a400

  • SHA512

    a5b927a5846fe269d53756810142862c8e3a5db73d12588368d40c9072bb1951c14d0ff346017afd549deb1d7c5786f6dec5bba6c58f0df6344f0085be75278c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tS:zCsanOtEvwDpj4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_ac3ec424c7849acc029b57c5d9bea1da_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections