General

  • Target

    2024-03-29_82009d459053c92fafb7b0669fa7f0c2_cryptolocker

  • Size

    83KB

  • MD5

    82009d459053c92fafb7b0669fa7f0c2

  • SHA1

    0b3327fb519bfc6ee6648f21e225e893b7d298d4

  • SHA256

    9ee175bb9826723411ad119caeaa6f558f5e1127d721a9a3955a93db7805eca0

  • SHA512

    180f358f0fd8982f413785b109f7e92a09afc7a108236b7f57d88f9d4afd50b2342551e7f16e6b666534fcc1bd97d80dd847cbe446a8995f6e7ebc1ada6afefe

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7t:T6a+rdOOtEvwDpjNB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-29_82009d459053c92fafb7b0669fa7f0c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections