General

  • Target

    2024-03-10_7267837127350dc350b1137a8b6f5a2f_cryptolocker

  • Size

    63KB

  • MD5

    7267837127350dc350b1137a8b6f5a2f

  • SHA1

    dff8c0ffe4d30c2098e6aa988e932591a7d256dc

  • SHA256

    2c7773514bb9843b59fb6303a279040dd2175ee96cbd46f1a693166c751d9571

  • SHA512

    cbd14e96bdd00ede05f1efa197708c8cbc4e0c32a8995dc8a5358d3a6356d83cdec126ce27fe0e6f44fb6ef372ab59f3688b9fb8625b28769188a902f7603b7b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo7cb:1nK6a+qdOOtEvwDpjI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_7267837127350dc350b1137a8b6f5a2f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections