General

  • Target

    2024-03-27_b44b9c6e4f00a9b5a5419640dad23907_cryptolocker

  • Size

    117KB

  • MD5

    b44b9c6e4f00a9b5a5419640dad23907

  • SHA1

    1241f28c0453c007eb57e847d8ee30e5c9e3a64e

  • SHA256

    a65bf49dd0a6a4fa8de70ad137a0b7585bafa3017fd6bbdfd1adec797c665e33

  • SHA512

    1f836772983365ac8b7f02a065d0be61f6aa5144888450e53bb4aa138483e4f7c2093d7612ef5eeef40a01742ea372226d026eb9eff81163f7618b9113b03485

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9F:T6a+rdOOtEvwDpjLzZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-27_b44b9c6e4f00a9b5a5419640dad23907_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections