General

  • Target

    2024-03-05_7c000aa3d93086e077ef801f9bb1d216_cryptolocker

  • Size

    83KB

  • MD5

    7c000aa3d93086e077ef801f9bb1d216

  • SHA1

    ddb07af43f20be064b6a610e7ef1412067464549

  • SHA256

    5d28eaa995f826e4906debc4a811e9e54f725c4d3751748751b191566000adfa

  • SHA512

    f5950fe6d18587d2a885c38d767ed07899c743da0c1e9afe2fef87309d4316a382f6923ae757b460c547021a9b7c85a2bbca700b6ce0ceb70529dd3b12c5daf3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT75g:T6a+rdOOtEvwDpjNe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_7c000aa3d93086e077ef801f9bb1d216_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections