General

  • Target

    2024-02-14_b86497f9da3c3f882de571ec93d47b6e_cryptolocker

  • Size

    97KB

  • MD5

    b86497f9da3c3f882de571ec93d47b6e

  • SHA1

    80fd5185c9229ee0ed7484bd7d4ed88fab984234

  • SHA256

    75b7d5bba811a1d40ae4cdd6148d8cb32678de92be43791c08508f9c9480db48

  • SHA512

    f4239c497993b82f94d2bf51fd60bdbdca9df0413ff9be8827c2136c222a5f4facb826d475144bed5aa475a12f15b732213d561ecaaeabed3a9ae455992387b9

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKdL:z6a+CdOOtEvwDpjck

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_b86497f9da3c3f882de571ec93d47b6e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections