General

  • Target

    2024-02-18_8df9dc70930daf8ef1e9d2b8948e0c31_cryptolocker

  • Size

    61KB

  • MD5

    8df9dc70930daf8ef1e9d2b8948e0c31

  • SHA1

    c37230a8626e6019bc21ab53094d2d86114207be

  • SHA256

    c8e18e46fbd8c27cf9aa46a4a5f8c5c303424db67eeef22c6a6798cc48db6b27

  • SHA512

    2302a04366479f3efbbc11d61228f16664923e44e6bfdfc55e18e30be3071ad54625886eb81101a7622ffdf54fcd6611ae2230e2738ced8708a7cce88b254d3d

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5S9Uta:T6QFElP6n+gxmddpMOtEvwDpjwa38H

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_8df9dc70930daf8ef1e9d2b8948e0c31_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections