General

  • Target

    2024-02-11_bb2441e7bf0b1ea0ab5c633b8b5fee7c_cryptolocker

  • Size

    65KB

  • MD5

    bb2441e7bf0b1ea0ab5c633b8b5fee7c

  • SHA1

    fa1f8ab9eef6b346bc6bea02d189ad682f940ecf

  • SHA256

    92858ecf3168b8511b5f72ae77842a98eed341535d0fbf2be4fc460d398a50d2

  • SHA512

    a42b1b2d359a5f948b9dab4e3bbebdb388db3f98463e5321f546f6add83a521215e29098dac5d1c34451782a66366d6e2fb9f7c41f2163922ed1b65ee7b42b19

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UncN:1nK6a+qdOOtEvwDpjJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_bb2441e7bf0b1ea0ab5c633b8b5fee7c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections