General

  • Target

    2024-02-18_8587ebc7ba7cf32927ef2ade8c7e11d7_cryptolocker

  • Size

    115KB

  • MD5

    8587ebc7ba7cf32927ef2ade8c7e11d7

  • SHA1

    d5b324c3219cc53128cf3d1950f29cbbc13fcb9c

  • SHA256

    7c6adde67a0a82817cb981edb95c7ecfe0b9ca1ac0c73f0a59d81c86327ac8ce

  • SHA512

    010108ebfbad16823c11513dbde90527dcefd0a30bc9729b4d24270d66473a35e8ac9a066c8aabd7ab5529d0cfcb47fdac4fbe9a3dc2ced2b0de9b004b0f65ef

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9h6:T6a+rdOOtEvwDpjLzk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_8587ebc7ba7cf32927ef2ade8c7e11d7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections