General

  • Target

    2024-02-17_b01952488cd5690fa8a7a88847aff8fd_cryptolocker

  • Size

    63KB

  • MD5

    b01952488cd5690fa8a7a88847aff8fd

  • SHA1

    1ddc15fe6bd9ef986fc22afed2c90003e95f32e9

  • SHA256

    707a30dfca99e75088cb348b94bb0e66ade540e6eeb0ed993c9d63c15c3c8b95

  • SHA512

    aa0c477daef1766f1f5c1123249506324deaeec8db395bc509cdbf34966c6fb87b9a142071683cbd93fbab9f5a94e2a7d63bbe0225ef831412ef885ebb474f94

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Ud:1nK6a+qdOOtEvwDpj4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_b01952488cd5690fa8a7a88847aff8fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections