General

  • Target

    2024-05-08_23ef350a014d54d9b42efdb28c3e2225_cryptolocker

  • Size

    78KB

  • MD5

    23ef350a014d54d9b42efdb28c3e2225

  • SHA1

    17c45b028a41a8fde6ebdb4073dd2332a7afa6a2

  • SHA256

    65aefb930d5aef6cfbc553fdd655deb1a7ee19d95aa84a9f9038f95a3b77310b

  • SHA512

    fcd342546e9d0adfcb905a397e620f992993034f99ecddb4cc132bae6d628d848432ef868b4cb0df2e602a74474f4b60a8fcf37e4bf82abf52286f9773aa3a9b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1A:T6a+rdOOtEvwDpjNtHPL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-08_23ef350a014d54d9b42efdb28c3e2225_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections