General

  • Target

    2024-02-18_b7b32dc093ff0394f3c3c15eb294839f_cryptolocker

  • Size

    83KB

  • MD5

    b7b32dc093ff0394f3c3c15eb294839f

  • SHA1

    8318f7e8af2cd22813e8e503fb4d88d18146cf73

  • SHA256

    605836d3ad17aa79b236383a570bdf0788646d043afb4bbbcba005bf8f3c1521

  • SHA512

    64c982d55f4c3e8aa582747ae2931e4711109f4738b9bf20d1113432fe78f942c8e0255f32043529508cf8c292ab0434ceae6a74ce6efdc239d4b60a59235dc5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7po:T6a+rdOOtEvwDpjNG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_b7b32dc093ff0394f3c3c15eb294839f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections