General

  • Target

    2024-01-22_bd55149ff84ee3629191bcfaf37ee91f_cryptolocker

  • Size

    90KB

  • MD5

    bd55149ff84ee3629191bcfaf37ee91f

  • SHA1

    96f05ba9be717a7ab7055ddfd49b2b7a92bf9de1

  • SHA256

    ed6f5b6c524a4ec8f1e6528426a159054a4add9199c69bea4954a5b2c513b094

  • SHA512

    1f00385512edda74ea72e605a31e0883b64e18a00149679dc4ce9cc10c588a0c02b6c4ebeb13985b9f9c472e0d5457e497b8a9fdbc04863c99c9aa23084db5e8

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/p:zCsanOtEvwDpjBp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-22_bd55149ff84ee3629191bcfaf37ee91f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections