General

  • Target

    2024-03-10_168a27aed52db7bccb52db12c031a7ff_cryptolocker

  • Size

    65KB

  • MD5

    168a27aed52db7bccb52db12c031a7ff

  • SHA1

    1761f1eaf6122198c5e2b077dd487c1a13491d5a

  • SHA256

    8aba1e0182dd6231bf8cf4eaf6f4a26ef1a1cbb2cc412965335cfe306b0b908a

  • SHA512

    a27799aaaff9f4e170725731ea508bde2f410d3d98d8a5e1bdc3db115f911383c6b5b8de51b17e3d06303864a8b86cc2c84fa34c7f3689a741db19552ad519c3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjc3CBy:1nK6a+qdOOtEvwDpjsy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_168a27aed52db7bccb52db12c031a7ff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections