General

  • Target

    2024-03-28_d09a5423c6f4dad22dd755783217453f_cryptolocker

  • Size

    77KB

  • MD5

    d09a5423c6f4dad22dd755783217453f

  • SHA1

    6aa2a3d8cfa9552c458e120a921aba127a907d19

  • SHA256

    824dd1433a1f2f92c456f28a821a2e8759169bd95e87f1310c770f63fda21538

  • SHA512

    fe408e185fa0fe5c9e3e835b449cceb31b934134da2d3d880ac742547f1fbc0bf8cd884b624ad5fc1f9bbdd0c8d515a87a81813c2bca1ee931fa1e496685fdbb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdS6:T6a+rdOOtEvwDpjNtx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_d09a5423c6f4dad22dd755783217453f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections