General

  • Target

    2024-02-29_69b242eef6e3a04f07e853e9763ba8ee_cryptolocker

  • Size

    82KB

  • MD5

    69b242eef6e3a04f07e853e9763ba8ee

  • SHA1

    f802d20ad547cfee056d98307485bebe6cf61b93

  • SHA256

    dffcfc5b2ad2acac38f56a7d739e12335dac26285c38829e29bdcf3eb756074f

  • SHA512

    ceb915b982fcaa711deaafc88c37ffad187d775c69ef4fc78013d2f2a62d32b31e6ed953898213a23a10a06482377eaacf7eac5237dcdd3d4b8d1c77dcbbdca5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT76u:T6a+rdOOtEvwDpjN3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_69b242eef6e3a04f07e853e9763ba8ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections