General

  • Target

    2024-02-13_00beabec8a8f7e17b1fb77db21e027cc_cryptolocker

  • Size

    117KB

  • MD5

    00beabec8a8f7e17b1fb77db21e027cc

  • SHA1

    0dd0cce068e0d959a99e6f1b4bbb3881d2bbff27

  • SHA256

    d01e0b792c6ebb3dabd3be5f5fa4f3f1976256305e3e6b569a3f81d3c632a1f3

  • SHA512

    ff42cdcf2271967c95056164e539dba60836c551d9f492074eb573548ddd4c90a6ce21b20c4df73fca4a56941781242112424610678aa6d30c9bc510297a369e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01pt:z6a+CdOOtEvwDpjczh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_00beabec8a8f7e17b1fb77db21e027cc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections