General

  • Target

    2024-02-12_5b4fe491395f949e358e71434a4b7cf8_cryptolocker

  • Size

    79KB

  • MD5

    5b4fe491395f949e358e71434a4b7cf8

  • SHA1

    f5ac5ed8b096a321ca2bd6e005bed772908839f8

  • SHA256

    484ef5a59cddbdb038ee141f9975bcb6e40558b3ea05c0a0d57e6aa88c42cd6e

  • SHA512

    3b31c96b79cd944293b6756d202d114cfc31d6b193342b46cf11999d0a70314eab97fac0ac653976d3d4b9873e198b83f21e0ed1a33d87f947a3a35164df3edf

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyhuqi:zCsanOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_5b4fe491395f949e358e71434a4b7cf8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections