General

  • Target

    2024-02-11_8deb546efcb667d4b25033e04e4eb4fb_cryptolocker

  • Size

    115KB

  • MD5

    8deb546efcb667d4b25033e04e4eb4fb

  • SHA1

    027f5afe3fea4c253dcf0394e6d0c0c0bcc50aae

  • SHA256

    ec2812172fddc827b030baad95c95b7be52dbaf4722c4396aa32aa445f84d152

  • SHA512

    0181799282ffcf52c51130e11ecb99a579d26a258e6763a8ec975339438ed9b8db750785241465f43c6535c87c233a8b1441b907d67dd90abdf152b98833960f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01tt:z6a+CdOOtEvwDpjcz1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_8deb546efcb667d4b25033e04e4eb4fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections