General

  • Target

    2024-04-21_c27207fa77d7c7b2c69730620e32c4d9_cryptolocker

  • Size

    122KB

  • MD5

    c27207fa77d7c7b2c69730620e32c4d9

  • SHA1

    9b772e958de9216d641c1a1552cd6d178cc39895

  • SHA256

    2d070c31b40e6e876b4a20740b56d6912b2dfbd181034f9ee927d718782b4b34

  • SHA512

    58b52aaaca86d7a67dec1a8e74453b3b76ac22778ffadde6e9883b99063ff783907bd6c796d0f71b4e77467d83536ee1e1a627a1d3949dfee3dc478b20128768

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviPeBu:z6a+CdOOtEvwDpjczN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_c27207fa77d7c7b2c69730620e32c4d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections