General

  • Target

    2024-02-03_b6022da325440e5edb2c885f41d8c33c_cryptolocker

  • Size

    60KB

  • MD5

    b6022da325440e5edb2c885f41d8c33c

  • SHA1

    f8daa83fe54629c3e5ea833ccdbb07ec93bf8d74

  • SHA256

    0cf7545593f843c1dc14d853d211dc155a5c6fd4e35800087a176abe9fe3bdd2

  • SHA512

    18e4c9197407110c4ebe8b2733bd8ce0c95cdb75f3b6f2bc5baa67cf121db87ec8cb4b33df8db144318738ab6b43a63aec158292d909f8399d9ab0fdb202d49b

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnV0:zj+soPSMOtEvwDpj4kpmeLmnq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_b6022da325440e5edb2c885f41d8c33c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections