General

  • Target

    2024-02-29_f841de5e155c0227142ba707798d28af_cryptolocker

  • Size

    61KB

  • MD5

    f841de5e155c0227142ba707798d28af

  • SHA1

    350e427a244424f266c9514887d72f6f2065ce36

  • SHA256

    c34f4f74a65cd1a43a82dd4cf5fa0e8f88721970b899dc8d337edee58ec9f72b

  • SHA512

    99ba1caf675e6984fec3a41cf9e0f22778c727ba46a183d024b7e359c2c029379904cf1158c72620c46884f021b0836676fc56def7b86d3c30284ba3e2aa0da6

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwQ:zj+soPSMOtEvwDpj4kpmeLmnl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_f841de5e155c0227142ba707798d28af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections