General

  • Target

    2024-02-03_b58b77fc91d30e807dbb8e64093b53f4_cryptolocker

  • Size

    90KB

  • MD5

    b58b77fc91d30e807dbb8e64093b53f4

  • SHA1

    7c3335f74e8371b164708a0c0f51e2531a77cead

  • SHA256

    1e1d2fcc0f8186a7e37baeed373c823bcbf83ab9f90cd80ed4805ed9c7060801

  • SHA512

    9821e1417e1493cdc749fe48630287827534dfae5f3edb87afbcfdd408098df852be6ba46d6d3fd5c0efd7fecd0475d123d746c1508a9990332cd486c90b58f3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87I:zCsanOtEvwDpjI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_b58b77fc91d30e807dbb8e64093b53f4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections