General

  • Target

    2024-02-17_b1b0068dcb5191a788c039db74c497d5_cryptolocker

  • Size

    97KB

  • MD5

    b1b0068dcb5191a788c039db74c497d5

  • SHA1

    485b9cbb81a74768dd66d882a1fc3cc69fabc1db

  • SHA256

    7e41568bca4ae0419d0afd43abb5d979078266069a436ce225b96b8dc18f0a3b

  • SHA512

    b67d76ea70eadc7131616681e7e3b0928e0a1ee0cf1807638b4280858f9fe01708b59eea04c7d3d0e5a4d0e798dbb09b2b99398eaf27752fb291236a2e32c580

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiU:z6a+CdOOtEvwDpjcA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_b1b0068dcb5191a788c039db74c497d5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections