General

  • Target

    2024-04-09_b28a15696ced65943aaa0cc391e09e44_cryptolocker

  • Size

    119KB

  • MD5

    b28a15696ced65943aaa0cc391e09e44

  • SHA1

    97463ec6eeae6dd215df0cd153d88ffd89d0f34c

  • SHA256

    ffbea752b67975981945bcb7696472a9ebf262b3b6dfe5c673164814600b38d0

  • SHA512

    aaa6199fa58ba2cafda2401476e7b8d931239dc9e1e114838b77ca195eeb2b69da91a0fe7f53472ececfce9924a5862f9c3900bec392235a2bec5728912476ed

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qatr:z6a+CdOOtEvwDpjczj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_b28a15696ced65943aaa0cc391e09e44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections