General

  • Target

    2024-02-14_a89c814b19f8d382419420b8f93e8bd9_cryptolocker

  • Size

    70KB

  • MD5

    a89c814b19f8d382419420b8f93e8bd9

  • SHA1

    5aeb3fbafee05a2f58781ddf1cf37d08990fb973

  • SHA256

    c91a2b984f71fe25d1049ef2b3b635a4331be63a4a6c9f4859b0d5b2361e68bb

  • SHA512

    750c31ab46ba8ca2e2f2f006b304915d70a65b47f9bf2454ce7ab437e920eeeadf9d78485473293d7710a35786b1590d0ef61d76902e6299fd90255a97c60dbc

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB+0:z6a+CdOOtEvwDpjQb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_a89c814b19f8d382419420b8f93e8bd9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections