General

  • Target

    2024-01-18_f8d379497e4f57f67f639e59a8c44727_cryptolocker

  • Size

    73KB

  • MD5

    f8d379497e4f57f67f639e59a8c44727

  • SHA1

    032e2fa34a97eb840ef4857e0f448982068e990a

  • SHA256

    be8a558ab4e217eef29378263fdb1d54b1990d2f418d5611dc78a426a0106f72

  • SHA512

    783a3a52d38b2f25e923c46940b5fecb9b54f9b6cda03f079b201bc9bf9476d3582014e93e7cb741dd340dab689c021477152d9082d8a5ce530a6d0836caeb1d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxu:T6a+rdOOtEvwDpjNtHPd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_f8d379497e4f57f67f639e59a8c44727_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections