General

  • Target

    2024-03-28_75e066ccdd73f0d7397440843114b20c_cryptolocker

  • Size

    83KB

  • MD5

    75e066ccdd73f0d7397440843114b20c

  • SHA1

    a0c0fbe415a410466201add28e4f32e187bcc53d

  • SHA256

    8c0596282864175c6b306b66577533ff825aa9b4b0e3a76ead6f860723aff20c

  • SHA512

    9b7c50a69cf96e2dcf2ea33f86966760fe60653e060ea6ea226660ad531adc53e60a7a5bb58c2efca9d22ecb37694d5fb3767acbb6ed427e75e9d6e1d99c7e97

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7f:T6a+rdOOtEvwDpjNz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_75e066ccdd73f0d7397440843114b20c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections