General

  • Target

    2024-03-14_adbad136f8226531f7dc6b7bbbbb390f_cryptolocker

  • Size

    63KB

  • MD5

    adbad136f8226531f7dc6b7bbbbb390f

  • SHA1

    20bee531d475d4bdb695ec83e05e0f165326ba7c

  • SHA256

    9242f80b9136cad984494951dcca2528961f987a8ccfb540177eaddf01e8bf14

  • SHA512

    a962dca73475f80f61613bcc0d4edf180b5d353b3d7c7bdbb38f781d6ea1f22a59a347e2628635f49629e28b49ebdd1fc3fdbb21eefe9f66e127eaddecdcf09c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ89:1nK6a+qdOOtEvwDpj1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_adbad136f8226531f7dc6b7bbbbb390f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections