General

  • Target

    2024-02-29_abb1c857bc4fd339122eeeaa31930b94_cryptolocker

  • Size

    117KB

  • MD5

    abb1c857bc4fd339122eeeaa31930b94

  • SHA1

    cb6bd528e54d7e82365ac8f2bfb33b54711a2a27

  • SHA256

    b6e44f4a43c7cec1a29400578ccbf08b7012fd61ca8a0c72114c8388a1aa872a

  • SHA512

    65e28e7f238c9cab888c0dc8de23630479ba78dcf3de65a3d0194c3dc9d2f6a0ebd0828147be6b33578fa7dfe4b558478814a8dc9bc8bb14e1f84b2f3bd47ebe

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp016:z6a+CdOOtEvwDpjczM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_abb1c857bc4fd339122eeeaa31930b94_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections