General

  • Target

    2024-02-14_b1a4d988a4ec3efd475490de2517acdc_cryptolocker

  • Size

    70KB

  • MD5

    b1a4d988a4ec3efd475490de2517acdc

  • SHA1

    897ccfef6844caee7697d32f0f18369d59db02e0

  • SHA256

    2b593517330abb2d11316ffd57a93c372614bd7b9d985f99dd080c4a61770f1f

  • SHA512

    a1e7e98b36093193e5fefbf16c8d63680f423c4a20274a1c83af4c956d36e3185b58005214d0dae1b2c7ec6d72e77f4c22d193a06b45fa5e4495197bfeda75d3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal3e0:1nK6a+qdOOtEvwDpj8J

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_b1a4d988a4ec3efd475490de2517acdc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections