General

  • Target

    2024-02-14_85babf7122344c6417a34f787688a50a_cryptolocker

  • Size

    81KB

  • MD5

    85babf7122344c6417a34f787688a50a

  • SHA1

    f78791b898d640677ccc056aea0252651f06c55c

  • SHA256

    4e0480ded624cf3b43daed14aecc1c93e3fb69215ea3e868946c831abc82d856

  • SHA512

    e5eb3a9d5f2697e1c90e65e6a0a62f30762c08c8ca2101404d0ec06f4f7703a9bd2e9b3e5f3e6294a4f68dba3b57226dd03e92ea15e076e718026592debd0ba3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7v+:T6a+rdOOtEvwDpjNC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_85babf7122344c6417a34f787688a50a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections