General

  • Target

    2024-02-01_8c4337eac2a005bcf3cd20a652286253_cryptolocker

  • Size

    82KB

  • MD5

    8c4337eac2a005bcf3cd20a652286253

  • SHA1

    63d46d002267f547fbb63680ba947366fab5071e

  • SHA256

    88b3daf7115795830d5df883af215a7dda0acaacdc6600846477627267bad13f

  • SHA512

    fc84ba9ad7e2c08a15eedc23e6e212af338366d6afe703d6269b3632a6e24839b44e0074374e34a77d29f039be62e68702451e093e96f9036860d391684d768b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1r:zCsanOtEvwDpjx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_8c4337eac2a005bcf3cd20a652286253_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections