General

  • Target

    2024-02-13_b50ff77a6c2c6d859c989b3123397ec5_cryptolocker

  • Size

    63KB

  • MD5

    b50ff77a6c2c6d859c989b3123397ec5

  • SHA1

    3846242c792f55efdb25ffa23eb66853d4b19f06

  • SHA256

    cef5ef4b28d89ee2c7b8ab8db648d4080cc0a038deb03700f8a7da30a07a0980

  • SHA512

    517f617ea469e58e4285a515af92cfb50f5f9177b21a50e51e8cb170b9d642857c65961c1d75c822a8df93dcfafbbbce90bb1817d9109f77ff60d6aed87d480b

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kT:zj+soPSMOtEvwDpj4kpmeLmQT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_b50ff77a6c2c6d859c989b3123397ec5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections