General

  • Target

    2024-02-14_90dbe37b3a282b2ba0fc90530868acf4_cryptolocker

  • Size

    81KB

  • MD5

    90dbe37b3a282b2ba0fc90530868acf4

  • SHA1

    00989b52b8598120f95b3d9dcc758feea0f133b5

  • SHA256

    b334f2af6b2514a51ba19eaab06203a190b20dba7cfa013e7a17e79350c155a5

  • SHA512

    ad3ee4f5ea627a0c5d045c12759a45b80c2eb59e4640749b0925ddfda14a2a9f2e6714ac7d410924c042440cc14529f770c8e128ab983b41b58b581769508e00

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7U7:T6a+rdOOtEvwDpjN6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_90dbe37b3a282b2ba0fc90530868acf4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections