General

  • Target

    2024-02-13_b50d09c1107894fb05d494c06c3a271a_cryptolocker

  • Size

    60KB

  • MD5

    b50d09c1107894fb05d494c06c3a271a

  • SHA1

    87ca3481ef3f93d474dd16ebcf4138f70a707200

  • SHA256

    e2d0b1da54661f00dcb26e11c846d0b300a37fca1d3c5b7a44d81ee100a4aabd

  • SHA512

    b1c10b24fbd302031e237ef351aacf944807271a1fd57f69781cdd2f2f4d9fad4bcc9974f48b579adbadf8f7b3839202c008cfb4efa991b7c8ba21885219b11b

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5m8z:zj+soPSMOtEvwDpj4kpmeLmw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_b50d09c1107894fb05d494c06c3a271a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections