General

  • Target

    2024-05-14_76bb4b9039b23c3b9beb473928585777_cryptolocker

  • Size

    87KB

  • MD5

    76bb4b9039b23c3b9beb473928585777

  • SHA1

    063a0d86d2f9665b2087a0e1c31dcc03beac2770

  • SHA256

    b66dd81d2f0729d12e5816bef94b88a30921ce8e4646b2d9037d56f7d3f5c79f

  • SHA512

    7691a2dfc29d4eac8e7abb184f2259428959ec30071634346b4dddc787b2d9dd651ee58a7648f8a71209bf1e61bcb14f01581338e2a8a609e27523155bb2b1ca

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rnd:T6a+rdOOtEvwDpjNA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_76bb4b9039b23c3b9beb473928585777_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections