General

  • Target

    2024-02-01_bc92b9443545983e7dea290af55a7280_cryptolocker

  • Size

    115KB

  • MD5

    bc92b9443545983e7dea290af55a7280

  • SHA1

    23a090f55357d430edcf998f16b1c72bf2a873d1

  • SHA256

    7c51e47c37e51d9f5c31f79c3f6a889dd604d7ed9677f90d46f907684e070f81

  • SHA512

    c9ab3d42715c71ff1aa46a38336581de2c7b69885e4610fc01bf065d781a23cad00f29474494a9b731026c26982aa74215adf8f8d56683785043a2c9bf147bbc

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01N:z6a+CdOOtEvwDpjczf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_bc92b9443545983e7dea290af55a7280_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections