General

  • Target

    2024-02-14_df4b88cf48d15f12d2b255984aa74dba_cryptolocker

  • Size

    80KB

  • MD5

    df4b88cf48d15f12d2b255984aa74dba

  • SHA1

    6f50353ce0b2b661d370af76ce50eb449e3ddb56

  • SHA256

    d2f65a01cf785a91e2bbb2be4b1726897a8a43e0fe97f8144e2f385cb1de61f7

  • SHA512

    8e1f16b94462a626c78299a9d83f14ce308ea0f4633c25aa0eb12cf5dc9956637c8b080ea033d5b37b28a0b0f0b2962397b1de3e63dcf1ca64894b3702f66e94

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd03:T6a+rdOOtEvwDpjNto

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_df4b88cf48d15f12d2b255984aa74dba_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections