General

  • Target

    2024-04-08_28e8e90d3c562f0dc365b769e2c54040_cryptolocker

  • Size

    84KB

  • MD5

    28e8e90d3c562f0dc365b769e2c54040

  • SHA1

    ac0b0a582ed8f6ef45b1ae0e1103b6cad237dfe2

  • SHA256

    b88dd8b427c18f3db323cc6384bf6caedd3c8984f3306e0d33f6803e67355195

  • SHA512

    9536a2b7b2584e95703dbaaf62e1b29666c95e946b6ae316caab3aebc354469f92e43749bdf68d13e0778f053ddec5a54789a6f8ca3ab9fd254080f462abaf23

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R9:T6a+rdOOtEvwDpjNA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_28e8e90d3c562f0dc365b769e2c54040_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections