General

  • Target

    2024-03-18_7b2ef7a08bdfe5c2e847cd2a07ab292d_cryptolocker

  • Size

    68KB

  • MD5

    7b2ef7a08bdfe5c2e847cd2a07ab292d

  • SHA1

    8036bd4aac2cc3182012b9bfe90981774e3c19db

  • SHA256

    c103217a289fa1b31211ee6bc977a0f14146011e9e2e8c7080b245ba7f1b643b

  • SHA512

    d8c7e7fe44d78d7ddb71e7ab23273e27f011c5113265665e07cdce1ce48d5b2a9e13edb3a16e9ec0ed1f1ad0939891b67183b66d78007a777fc00f09e542afb1

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBa3:z6a+CdOOtEvwDpjQO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_7b2ef7a08bdfe5c2e847cd2a07ab292d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections