General

  • Target

    2024-02-18_b94d6a9b1c4bf606211cfd4fc0008d64_cryptolocker

  • Size

    63KB

  • MD5

    b94d6a9b1c4bf606211cfd4fc0008d64

  • SHA1

    ef798abb52fdadc10b2a5c18f027251c13f73b5c

  • SHA256

    313dffb7e793899e029533935c77608dfbfab757669ff58e39678d778dcf0cc5

  • SHA512

    9966f762698fc78cdc692f6cb04226959b0c672ced4058eab1d3bc51c6a805e1134ff485501cdbc0e430efecc26145b0da9d252474ddbb703df4b9bc10c9aa79

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo6O:1nK6a+qdOOtEvwDpjN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_b94d6a9b1c4bf606211cfd4fc0008d64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections