General

  • Target

    2024-02-12_a8bdf47fbf272a0a928b966b9f0a8e52_cryptolocker

  • Size

    148KB

  • MD5

    a8bdf47fbf272a0a928b966b9f0a8e52

  • SHA1

    a272d7a9005685a6f27308c5a389ce5382c16c2f

  • SHA256

    ec9e62ea27a07bd1fe18f3df6ba1362b0dc6fb12140db9875942c7a220d65853

  • SHA512

    63221fbe2c9a22679a505470d360ef4fe07337af336afdd57ed28e989d0aa558b6ba44a001f723a3421f926f212a5772e0cb70af5b6e5d899a2d5ccb795b1c50

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eXj:z6a+CdOOtEvwDpjczZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_a8bdf47fbf272a0a928b966b9f0a8e52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections