General

  • Target

    2024-03-28_1f08426d8d374f4f7968490f5fbf160f_cryptolocker

  • Size

    65KB

  • MD5

    1f08426d8d374f4f7968490f5fbf160f

  • SHA1

    2f3b7cb32a646f6371b9e8d6101166a15e6c5880

  • SHA256

    9d19e60deeccb9885db48d7284646065defdebe87e73f30f668d41a557fe3109

  • SHA512

    92d631af44581ffa4ce88dd70d92176dcfaee60f9ebffb304aa134b348fe6e60a2eb8a5aa83555fdf55d4f19c67771a1fb3d05a5672eedf45aadca5357a3c198

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K76:zj+soPSMOtEvwDpj4kpmeLmp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_1f08426d8d374f4f7968490f5fbf160f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections