General

  • Target

    2024-02-13_7b8ca7f2f0e3d298e257dc8cbeed1124_cryptolocker

  • Size

    80KB

  • MD5

    7b8ca7f2f0e3d298e257dc8cbeed1124

  • SHA1

    58d88a1416e851b78668e3ea40a768f881b9a8bf

  • SHA256

    018cb42e7dd0f10e8b3f4381c4b5c42f853abc3d04924af2cf432c8f6802e308

  • SHA512

    6eadd890b8b55b47db2ac912bd03330e37a88d14b0a7c14b9426794fc924ead92f0d19885c6449123591a2af629592fab9ef9114dfce5c6bc80d46ab09bed172

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2fF:zCsanOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_7b8ca7f2f0e3d298e257dc8cbeed1124_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections