General

  • Target

    2024-02-19_4bfbddeefbd2a86f277d550dfabceacd_cryptolocker

  • Size

    68KB

  • MD5

    4bfbddeefbd2a86f277d550dfabceacd

  • SHA1

    aa829a39d0766097bd6750b7405ffbe1a333ff76

  • SHA256

    38319cfe63e77189b288f728ef403dde0a123c3755c064d8f31eace706c8a0a2

  • SHA512

    7e17468f4cc8edaed5039256fdde66bb30883cd0acd376f659ce614c3e9d32bb79d486ea82affd4a1bcfac83c2b9aec645c787401bfd4b8c4432e55d9797d449

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBo:z6a+CdOOtEvwDpjQ2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_4bfbddeefbd2a86f277d550dfabceacd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections