General

  • Target

    2024-01-23_bd1e1a3ca380aa3b2b173ad9f6b27297_cryptolocker

  • Size

    60KB

  • MD5

    bd1e1a3ca380aa3b2b173ad9f6b27297

  • SHA1

    fd098316353d8f2bf9f76a2e2bbc2333e584eb63

  • SHA256

    00ca4b093dfe24fff78ab1ea0c610055e5081b0818145fbb49a653108e5bce52

  • SHA512

    e79e380fdeb83f866bf9898aee2b88202e7fbd86fcb9cfe6c5e27de15c69e62c8e5a0dbd5a7847cad732e4f08057af7a02c4c1405f20e1a304ce3ac00581d261

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKy:P8mnK6QFElP6n+gymddpMOtEvwDpjYw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_bd1e1a3ca380aa3b2b173ad9f6b27297_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections