General

  • Target

    2024-02-11_b4e82d4c2f601216c7153da843b249e1_cryptolocker

  • Size

    74KB

  • MD5

    b4e82d4c2f601216c7153da843b249e1

  • SHA1

    20ec5e54df35a69930533c2774bbff906f5f6d94

  • SHA256

    ef4b73c4632de5b9bf7875fdf86fc0f5829491c64ab69d9fb8dcb8fa215ba51e

  • SHA512

    3fbe6c2c274bbe30edcd6eb7fd7e05060a6fa067de554290940bda6a2283506ac37771833506db3423eb5b5fa4ac6315096a7aeea9415e5c7c9f352084f10e78

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4T:T6a+rdOOtEvwDpjNtHPr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_b4e82d4c2f601216c7153da843b249e1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections