General

  • Target

    2024-02-11_17ba324309cbeb80682fbf095b1805b8_cryptolocker

  • Size

    90KB

  • MD5

    17ba324309cbeb80682fbf095b1805b8

  • SHA1

    d8bcb6d0c573f970792e83100f06e9a6b0159aa8

  • SHA256

    8c4c1c8a7c3c9602da00ac61c9ac3385a390f7b619588b428eb3f44e4dce46c2

  • SHA512

    a2caa1536a6c00faca70766cf5a79790840021146f54e0eeb18ae371ae307cf4a22fba6e569f6b1fc53a65f3fd9e46e576654675d04f5e752bdd875c533bccd9

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uvl:zCsanOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_17ba324309cbeb80682fbf095b1805b8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections