General

  • Target

    2024-03-12_2767f22decf43223d55acde9de7395af_cryptolocker

  • Size

    79KB

  • MD5

    2767f22decf43223d55acde9de7395af

  • SHA1

    38c16c1b589b81992f51e7718e318d43d0b65ac1

  • SHA256

    ab0d313aa1a4e086a585699b9aaae52b2d0ececf2c53ba8d33aa97f7c4869961

  • SHA512

    5df660f9f7b91458e5a910df06f3c1573c4de0bb06c541abf08d0bd1aaaf9dd20ce292a497de985751b09c2c34d54da40b2bcef31b3a37be0a0d214ca022b2c3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPu9m:T6a+rdOOtEvwDpjNcm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_2767f22decf43223d55acde9de7395af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections