General

  • Target

    2024-02-17_99eb70f0fbdb41f283ac020b0dcd8988_cryptolocker

  • Size

    108KB

  • MD5

    99eb70f0fbdb41f283ac020b0dcd8988

  • SHA1

    443eb49954514c4117a0bd93066056aeea24ab8e

  • SHA256

    75823f6be0ae261efd920453d677b33021c3426df5d7f2db0a789b9dfa6774d8

  • SHA512

    83c9e2d3cea4c06893f87748ac1fdb69e550203cc2eb26211f531b7257303158221bfadc9bf18d02f530fbde2e168d237048571fd8c19eee4e00df2ba68f4361

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksgEi:1nK6a+qdOOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_99eb70f0fbdb41f283ac020b0dcd8988_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections