General

  • Target

    2024-02-03_8678566148e1bed9b79b1144c9c48f3c_cryptolocker

  • Size

    78KB

  • MD5

    8678566148e1bed9b79b1144c9c48f3c

  • SHA1

    cfd38516376bdd9b4b2ff06f7c263b6b6eccc99c

  • SHA256

    9d23fd7c5a3693f7c3a89261b18761758abe0c56cf66fb7cfaf0a6a2bed3c223

  • SHA512

    fbc60df1679f7654b52b660d6747df49979aac575c54fe5ac8febe89839b5117e3dc183fec4b780911226e51b881a737507bb25c62d16446d1446b8c7a72a267

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QD:zCsanOtEvwDpjX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_8678566148e1bed9b79b1144c9c48f3c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections