General

  • Target

    2024-02-04_bd3ad963ccc4c946c004541cbbab458b_cryptolocker

  • Size

    61KB

  • MD5

    bd3ad963ccc4c946c004541cbbab458b

  • SHA1

    dc9eca211fe5527b7b267a9904da69e75450f822

  • SHA256

    fb81188e74f11e202e1619c5982bc38af5c9f7cf6a7f6f84798cf35a7262ab71

  • SHA512

    5f75103d61a607b67a6d1436d8a048a71dee3a83a0e337bc091bc1c436f33aa93002ade514d0b26ceed6d2943ab0012b6e6c3a20c17acab4c969e07bb0d5a9cf

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY7D4:1nK6a+qdOOtEvwDpjv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_bd3ad963ccc4c946c004541cbbab458b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections