General

  • Target

    2024-02-12_f84b508c0dd784b3976d799eb8b75e5d_cryptolocker

  • Size

    70KB

  • MD5

    f84b508c0dd784b3976d799eb8b75e5d

  • SHA1

    ceb454778892e74aaa8bc9820310dd928b8992d8

  • SHA256

    a9f26052fcb99b7643cdbe9a7abde49dea475fc6b9c36774c034647e39b7862b

  • SHA512

    e58cb4b049c186a9872fe1f1f07f11900f69509e52d15d166e792e49fc34043ddd1d196d555b25a562f0828a0fce28f1014c6e1067619204e83f57e119263337

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleO:1nK6a+qdOOtEvwDpjK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_f84b508c0dd784b3976d799eb8b75e5d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections