General

  • Target

    2024-02-11_d0cd7f2d4c6f4ffb1b1bdc1b808a1ead_cryptolocker

  • Size

    65KB

  • MD5

    d0cd7f2d4c6f4ffb1b1bdc1b808a1ead

  • SHA1

    43849ad3e89c49964c142e56793c64a26241e0de

  • SHA256

    bf0becc208202c2c26967005b817360e5d45076a5276a971401ff40b3b8a7eca

  • SHA512

    c3f09ea38e4435033652c5acd225c7f792de77ae209444ad7b60ecabbf9e95cea29bcd20b1aa95dcc288c62ac52f663c1c1c8ab6eb891e35e02d641490609502

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXa1:1nK6a+qdOOtEvwDpj2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_d0cd7f2d4c6f4ffb1b1bdc1b808a1ead_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections