General

  • Target

    2024-02-14_dfb4fd7b24a7a842d96636f081cbb5d4_cryptolocker

  • Size

    57KB

  • MD5

    dfb4fd7b24a7a842d96636f081cbb5d4

  • SHA1

    63e0d8be99e879835c9a9a9a7b538ad2ddc47992

  • SHA256

    84e2bc3f79d34bda5f9e7d77b9d63eddf12a14d3d2e42e7ea23ae832575988fa

  • SHA512

    f0d919c5a94ffab5a51dd5111fcd93c143f7ac3ba4f90273ea8796abc42033d7598240f7170bdcc75c92c197ee6d48b0381174db1a1cb17d028c3225aa9cf266

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5app1k:z6QFElP6n+gKmddpMOtEvwDpj9aYa6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_dfb4fd7b24a7a842d96636f081cbb5d4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections