General

  • Target

    2024-05-07_7470240feb4a77d917001742b7e68858_cryptolocker

  • Size

    89KB

  • MD5

    7470240feb4a77d917001742b7e68858

  • SHA1

    df127c441d7b4f1bd165282ecfc15aeccf7a5dfd

  • SHA256

    2f1f97c7010ae98732f224b5a3c83e8617f46fcb6a4adef87f2b14ebd547eda6

  • SHA512

    508de8ac18b696280b27a29b6168f65e1720c34f391d341d6033bf06a725ca4387e1be29d4f3cae0e1088312bf0a81dcd8cd31d9f9aac4860dfe2ac4a4154dbb

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAL:n6a+1SEOtEvwDpjYYvQd2PL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-07_7470240feb4a77d917001742b7e68858_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections