General

  • Target

    2024-04-29_772776a1d68a7135d75987334f540b13_cryptolocker

  • Size

    85KB

  • MD5

    772776a1d68a7135d75987334f540b13

  • SHA1

    be9d8e1e99a09a93055d2abb6a677b5a85f13ed2

  • SHA256

    fdee14ea820bdd6c45b64ce008df6fcfd69e8da62348bb6d23f1d757321521cd

  • SHA512

    3db74d6b6550b7ef741354a6c4377a4c79b1dd549244971a9017359cf87d046e04bb8452ce1569a21e65e923d23aad2d4b102493a7433e19c3d7fe58be6d57b1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R6:T6a+rdOOtEvwDpjNz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_772776a1d68a7135d75987334f540b13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections