General

  • Target

    2024-04-28_833bd7b806d20c795ff22f13aff8b320_cryptolocker

  • Size

    80KB

  • MD5

    833bd7b806d20c795ff22f13aff8b320

  • SHA1

    68cf3ed289186b7440b11093f2c5ef978640d5c6

  • SHA256

    3c9c661e6f2f9e21d9aaaf35a0986f0f38c721032da5b69ae71ba8e51b0e0704

  • SHA512

    55249a24d450760008bc412e048a091f20e2c5129bd510a37ee61261338e4ae75a03c280d2144a71b7a8f2dce238ad80e1175d031c812b83b85c34d54a0169ea

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdw:T6a+rdOOtEvwDpjNti

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_833bd7b806d20c795ff22f13aff8b320_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections