General

  • Target

    2024-02-17_b217d4e98eec0ea03c5376e6cbdacb92_cryptolocker

  • Size

    90KB

  • MD5

    b217d4e98eec0ea03c5376e6cbdacb92

  • SHA1

    9d3298d61ab6cebc54a787e897c023718cac67ea

  • SHA256

    b5a8687209889debc635d15316cb1c33331a8390310b7aceae7205cd3116583e

  • SHA512

    c3136a35467c463e843f2ff865a32f46df76c8026dd2ed17162bde2775178419bbd3a9dc425cb708128eaf7cec77e8b2c83931833e845bd01cdefa0ff50a4e76

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWp:zCsanOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_b217d4e98eec0ea03c5376e6cbdacb92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections