General

  • Target

    2024-02-03_8bb5ebd4b39bb08e9ed6edef65192531_cryptolocker

  • Size

    61KB

  • MD5

    8bb5ebd4b39bb08e9ed6edef65192531

  • SHA1

    4091ebd54b7907503305553c45c0c274fad274c1

  • SHA256

    00bc48e8d11fd79f7e33313c15a0799f5750f20eb0ae805253bfbe0a04a9ea69

  • SHA512

    70118cdb4133eece1ed0c94b58b4220582c73f70d63b0903bcc8817046c6f5303deec916671d0371d59284505e79d6d2ad30bcb67cd3a33881732a54f4bd85a8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY1HW+:1nK6a+qdOOtEvwDpj+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_8bb5ebd4b39bb08e9ed6edef65192531_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections