General

  • Target

    2024-02-17_f11752fafcfdf03adca087a5baf9a2a5_cryptolocker

  • Size

    148KB

  • MD5

    f11752fafcfdf03adca087a5baf9a2a5

  • SHA1

    8836aa381205bb2315cd3bc39f1fa274c1e363dd

  • SHA256

    ac8b4c0bb73fa28ea230262884a027fc75207537ddc60f0efd677e87ccecd844

  • SHA512

    97369d003ee5526d877103f1811df23cfb1f64ea34778f47a8cf2ffafa1e48f7564851d93eb9200a8507ca8c52887343935382cb5b09fb59900f4e3e28fd902f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eS+:z6a+CdOOtEvwDpjcz3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_f11752fafcfdf03adca087a5baf9a2a5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections