General

  • Target

    2024-01-24_bca9c9ab50da5a3dd81ec074c527a18f_cryptolocker

  • Size

    91KB

  • MD5

    bca9c9ab50da5a3dd81ec074c527a18f

  • SHA1

    e8fe1b205be10eeab456ff2dedde42cf460f3bbf

  • SHA256

    0555b0d0503944156984f9d5550bb71658cdca9e024e0da1780636256ae48033

  • SHA512

    d0a25b8065b375b24e95c1e20a5ae772d084650a49fe9988b9940e0b11b738810b81ffe7b249d2b0741658dcb52fbc6cda57ddd7c3a6b182878bb9110750a2de

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/D:zCsanOtEvwDpjBD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_bca9c9ab50da5a3dd81ec074c527a18f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections