General

  • Target

    2024-02-12_b1d789e4e7b04a32a288ac88af5fecbc_cryptolocker

  • Size

    97KB

  • MD5

    b1d789e4e7b04a32a288ac88af5fecbc

  • SHA1

    dabc0a0b99851d107b4c86e1eed89f0ef149f48c

  • SHA256

    b6a3a60d51b2a2483e73cb13dbaaf2036656d5f05924a63574f287d67d511975

  • SHA512

    335b7d64dcf46383898687b08e4b25f4f57c520e51bac2f50d1600bc31a4ee3a8e480fce1463a53ad9145a7f64b137fac99342b9c62a5c0507ff0c2874de2254

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/Bbh2:z6a+CdOOtEvwDpjcm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_b1d789e4e7b04a32a288ac88af5fecbc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections