General

  • Target

    2024-02-11_2fb7a715098ac8c654a4cacbbac214f3_cryptolocker

  • Size

    109KB

  • MD5

    2fb7a715098ac8c654a4cacbbac214f3

  • SHA1

    1932371c57a3421c70ea6b83d367fa1083760f4c

  • SHA256

    6b7c69ee4cb678005f00537d73daf158b7270397a97351c11111a1e5d68cf9ce

  • SHA512

    85e578a0b3f0b33eb88a3806b04b69f7e2ba4a78d06ac09da08778a51fe432dd5ff8bbfa2e774c0cb1ce1fa6c28efe96b3844f37070bf291bf098e56e1e3dc41

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMg6b:z6a+CdOOtEvwDpjczA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_2fb7a715098ac8c654a4cacbbac214f3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections