General

  • Target

    2024-02-12_884ff9b8fd15aeeb592cce1d926affff_cryptolocker

  • Size

    83KB

  • MD5

    884ff9b8fd15aeeb592cce1d926affff

  • SHA1

    5bc65913a632c37e95dddf5bde9f4932773f2d30

  • SHA256

    4669a8b5b72dcf9776b5ed0003b40d95691f639f928adbae12d3acb978b5813b

  • SHA512

    9e7d9a095ebb16a38b734fb6f0c1b117936b46c1c0f7e057abaceaad282ecc66e1ef85ae13b5bd0d4ea02ce7c0ca250579e550fb2dd9bef631f88d6666f15266

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1YZ:zCsanOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_884ff9b8fd15aeeb592cce1d926affff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections