General

  • Target

    2024-02-14_7f8b8c560029a21fbadf084a25f50e36_cryptolocker

  • Size

    116KB

  • MD5

    7f8b8c560029a21fbadf084a25f50e36

  • SHA1

    c188e3dd31d3576da51a38eeceab755eba796506

  • SHA256

    f2e22b73b2f442d04994f3b6c7e25c9aca9e805170948896fd3ac271b9893242

  • SHA512

    588325a7121b93c581839f48d03f7c49973419e81cafe82611a747004f9c653a2fb897a1ae1285bab096d55c47f10d242c7d9e2e453e25716785675ed3b8bfde

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/cH:T6a+rdOOtEvwDpjLzl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_7f8b8c560029a21fbadf084a25f50e36_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections