General

  • Target

    2024-03-27_0ac42be9b439c8e98cfbfba700c1ea9f_cryptolocker

  • Size

    84KB

  • MD5

    0ac42be9b439c8e98cfbfba700c1ea9f

  • SHA1

    f5852010c7981a0da957e9a0cc04d52f27eb66d9

  • SHA256

    5260c8e6345c7ac7703b7215713c7847836d63fa60cb91f3cac2281c70135027

  • SHA512

    f986b6c1d5e5200f95651662f29350f3f1abc627e29e3cca2a3356e4e4b2484a6acc98f89eb792015082c31f5fea60814e501015cdbd9465b2dc89260b82414e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1lQ:zCsanOtEvwDpjI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-27_0ac42be9b439c8e98cfbfba700c1ea9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections