General

  • Target

    2024-02-29_ba23232799a63c0cc40674dfc9ff4ed1_cryptolocker

  • Size

    81KB

  • MD5

    ba23232799a63c0cc40674dfc9ff4ed1

  • SHA1

    a72da1fbefa73ae624293bf123f56919fce77074

  • SHA256

    ce638344368834e62eb84d8b5dd1e030dd9123dcab4e5142982c4a2d2efe66f3

  • SHA512

    4d96177648357a840b64ab34c86c1af43df97530ad79e6f7ec4c525264a18ce659878dea7f12a010d3a6ca4d8cd633b02350fbdee42754134bdc47ba6169a7a1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd04:T6a+rdOOtEvwDpjNtH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_ba23232799a63c0cc40674dfc9ff4ed1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections