General

  • Target

    2024-02-04_8ad16f908d11444ff0ce29960453e41f_cryptolocker

  • Size

    74KB

  • MD5

    8ad16f908d11444ff0ce29960453e41f

  • SHA1

    966c90b551b7e220942db3797912dbc07b0b03a7

  • SHA256

    081d7c8076bbd41c2c281e77cdecd366284357dbce8e97d268ce2d9517d6004b

  • SHA512

    0c8e6072d61bb22559e32730aee614bc098c99186979d1adeeff47e8ab2e22f40e9ee7959945a649cef9d422f07cdd34379dbe7ecfd8479cd2e0e64fc7eeb7bb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJc3:T6a+rdOOtEvwDpjNts

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_8ad16f908d11444ff0ce29960453e41f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections