General

  • Target

    2024-02-14_85b07973b71665ae4b4c4fcd98b531dd_cryptolocker

  • Size

    81KB

  • MD5

    85b07973b71665ae4b4c4fcd98b531dd

  • SHA1

    c619b836a616f35f7c61a3657ebae83f6dfeaa6b

  • SHA256

    eb99d8596f53239b06a9eab7c965ca0bbc9785bbce15c6e449c3a82e5c6a1ac7

  • SHA512

    35c4d2a9325e08f67fd8fd3277bb16426cab0e593e6705f86b2be2eb650a85eed352f7e34d42e993b4a5835479c3ad60de295beab7d3a68e500aabc5f2e48622

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWZP:T6a+rdOOtEvwDpjNtu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_85b07973b71665ae4b4c4fcd98b531dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections