General

  • Target

    2024-02-14_be25a8123b08a2f838b7c3f1ff9f8a13_cryptolocker

  • Size

    62KB

  • MD5

    be25a8123b08a2f838b7c3f1ff9f8a13

  • SHA1

    8e19ac8283cf3498d122c68bfb0e44a13bf15a7a

  • SHA256

    4e1f98cfe482025ca4221ffa8eeb15041f02041e73bb8be06f6b4f44ec0e50b3

  • SHA512

    eaffdb27907f3e2eca589e998247d769464df0d1269015ec1d09c26b4ebae2e40e8c684aa5f829a0fc2a9c8d4aa6740291f8727075fd3c36db9c20c1c081c873

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYxD6:1nK6a+qdOOtEvwDpjz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_be25a8123b08a2f838b7c3f1ff9f8a13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections