General

  • Target

    2024-03-28_762a0f89409ec40d245daf8f0ffb4bff_cryptolocker

  • Size

    106KB

  • MD5

    762a0f89409ec40d245daf8f0ffb4bff

  • SHA1

    b6a15f5dd4dcd3e899858cdb4dab792c26c70caf

  • SHA256

    7b2879e675064e8dd0c91ad43788f2adff47f1d621fbb734ba5cf1033ddb6cf1

  • SHA512

    d79a27c67a37d36c005520886ca8b75e1bd38371e8a99845ee34c7cf975eb26adaccc263f6ff707edcef94c42f3c8614ca6e3c913b87621ee8180f646890fca2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaLaC:1nK6a+qdOOtEvwDpjW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_762a0f89409ec40d245daf8f0ffb4bff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections