General

  • Target

    2024-03-15_daeb097290f420db9b3a2a8fc18d34dc_cryptolocker

  • Size

    98KB

  • MD5

    daeb097290f420db9b3a2a8fc18d34dc

  • SHA1

    da476ad99fb50ec594538609b9fd2cb5100ba509

  • SHA256

    dbb7a6a7f4e6eaf9c62757f99834b035c031cca817d8f1a28988cdcda3c0fc8b

  • SHA512

    b9268dbe0e671748805f92690b337945ca244b00c9a4c41681c28dbee560422d37334096f060ba0183b8e8114cb0d8e4a2623928c3ecb2e9a1c8eb8dc30b6558

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQpdc:zCsanOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_daeb097290f420db9b3a2a8fc18d34dc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections