General

  • Target

    2024-02-04_87f6cf3986f8745bbeb0c839b8671a25_cryptolocker

  • Size

    73KB

  • MD5

    87f6cf3986f8745bbeb0c839b8671a25

  • SHA1

    ca880e70754b15be428eb31fdc8b6faf8174c2a1

  • SHA256

    31a252aedc126f627d31e90c2e52ec6a0152efc762f3a0d874a8299abc4957ff

  • SHA512

    46cdfffdfd351047c9f9e6595cb4c851beb2ef75c2a42ff31868b1c88e1c194fd8e77908d0db30703a46caf37f052e1fa64323cc1985b6417b4325f2cb3477c1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxf:T6a+rdOOtEvwDpjNtHPY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_87f6cf3986f8745bbeb0c839b8671a25_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections