General

  • Target

    2024-02-14_80e507e6a9ba5858f61687a1851ac14c_cryptolocker

  • Size

    116KB

  • MD5

    80e507e6a9ba5858f61687a1851ac14c

  • SHA1

    9bfd2e6e855896c15010363a8ba844c5fae89a6f

  • SHA256

    57f0330abc65535b75402e8b8570f798832a658ab01e3536358636e3fd831b41

  • SHA512

    2d594f8997f442675b5550ed66c401faec60b450baadf919888839c2ba893ad19f09c0bddcf8c7bc476f87ed06e552675897f19cc0ce66b413dfd76295f550ae

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Z:z6a+CdOOtEvwDpjczr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_80e507e6a9ba5858f61687a1851ac14c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections