General

  • Target

    2024-05-28_7e7752604366a984a90cdb2813077549_cryptolocker

  • Size

    94KB

  • MD5

    7e7752604366a984a90cdb2813077549

  • SHA1

    f39cf1eae39ee62624b26af3cb212326d1bb7219

  • SHA256

    d7cbfef67b462d20b4db6e13e66fb6606b8535b715da8ed6030d2555d093e9ea

  • SHA512

    ff70f34c5eb0bcdcb93796a837a8af8f5a52b39fd307566f842241548b71fa04c7c8f27ca2851c425d0c3569b1071029b5cb370c2d4ed680e6601538af4048ef

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kb:zCsanOtEvwDpjBo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-28_7e7752604366a984a90cdb2813077549_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections