General

  • Target

    2024-03-14_28eac1314eb80bcc48b43fdd62fbb4c5_cryptolocker

  • Size

    62KB

  • MD5

    28eac1314eb80bcc48b43fdd62fbb4c5

  • SHA1

    43f4b9392a8a396795246033dcc5de1e31cea299

  • SHA256

    b045e491f392864ffcaccdfe73262819d2752e8ea5d30e2db121a71606804df8

  • SHA512

    56d8b0141d442050efe75e5d121883e7ac3dca7c18dc29a3037127f39f68704ea69488a9ad205c3934cbe52a85f2fc2fd092b2cef8012186963e2d210701a2c9

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwpf:zj+soPSMOtEvwDpj4kpmeLmnef

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_28eac1314eb80bcc48b43fdd62fbb4c5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections