General

  • Target

    2024-02-14_8068a2c6eab97351d56dfb80a3ec8101_cryptolocker

  • Size

    103KB

  • MD5

    8068a2c6eab97351d56dfb80a3ec8101

  • SHA1

    45e1cae082ee514395a76e6fb16fac19b63adc0c

  • SHA256

    39a5aaed0e532c7d9316282c1124517a243db13c0d0e2e31b14365e06d3ffa6d

  • SHA512

    8618a7b03bd633f6fda62366e4202da6399f4b84e5e3cabef0a09064b71a6187487042279ba582ec20326b6e37064968f0a88230316b4528f632312093571b02

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks0M:1nK6a+qdOOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_8068a2c6eab97351d56dfb80a3ec8101_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections