General

  • Target

    2024-03-13_7a9721ade2ba11c3e9682dfbfef077ec_cryptolocker

  • Size

    75KB

  • MD5

    7a9721ade2ba11c3e9682dfbfef077ec

  • SHA1

    c74cf173f70d355dcaaa6f07bafded69bbbd2e78

  • SHA256

    2f3fb5737d266ffd8623c3d8e4164ead528a8a339b2f3fb7613d03f16ba803b5

  • SHA512

    933134cb7c5eb42fdcb6a1e5f5c6c3611710839ea711773d4e19390676b574881acf4c4df68bc488e77adf1ca948b7a98acf018e10c3ea5b97dbf004b42dd820

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcR3:T6a+rdOOtEvwDpjNtu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_7a9721ade2ba11c3e9682dfbfef077ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections