General

  • Target

    2024-02-14_8267ebe04de39f5cc17d68ae45efb9d9_cryptolocker

  • Size

    116KB

  • MD5

    8267ebe04de39f5cc17d68ae45efb9d9

  • SHA1

    23228b7ffd334c1b03be38fa8735bbb94a581194

  • SHA256

    bd5420132a0d9387df4b127ad7fa7e813e736314d472a4d6faf8ab070ca52ad1

  • SHA512

    ff421c548b40fa43f73fcf1067b4d81a1f1127c587b2036d2ac7f906586d42d4f587f0337fcc03bff1d7866441c1ad4200a1648bc7550afcbbe90cae5223c9a2

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01H:z6a+CdOOtEvwDpjczF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_8267ebe04de39f5cc17d68ae45efb9d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections