General

  • Target

    2024-02-13_b7a0ddb8e83b14775352fccd22d304a8_cryptolocker

  • Size

    148KB

  • MD5

    b7a0ddb8e83b14775352fccd22d304a8

  • SHA1

    4c39f51e74cd70ef98fb8be8689f2ae967d31e9b

  • SHA256

    d18e08a5569739215546b413b20fb696864d5499821d379c921cdbfc9eefc74e

  • SHA512

    3b9706f17b82dbd3414e8b9008d5c8641919c2a57556ba5bbf4323552a0cb96a28b37ec1183ebd9f8c6b227631734d4033ed0f3da92f2dc70444b90a457892e9

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1e1:z6a+CdOOtEvwDpjczP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_b7a0ddb8e83b14775352fccd22d304a8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections