General

  • Target

    2024-03-10_dba07b8139e403c4ce954335c5feca9c_cryptolocker

  • Size

    58KB

  • MD5

    dba07b8139e403c4ce954335c5feca9c

  • SHA1

    abb8d1133c2b2e7fd23c592a1e3b32132e116236

  • SHA256

    96cc463d104001566934a444bd0751849cd88a227c022f4b67e9c3c0dd4bcbc2

  • SHA512

    a13fdb95d20e4e0dcf1ea84b696b3e8a11bd1eb7016e4bd7f487caf3d1b35559fbcd4f1b352801a3204adb4620b3e280cb65d7a8e7d05026a7f45b02e05b0581

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLzbD:zj+soPSMOtEvwDpj4yzbD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_dba07b8139e403c4ce954335c5feca9c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections