General

  • Target

    2024-02-20_8bbbeb046d27f2db9703d6d6e5f6a61f_cryptolocker

  • Size

    93KB

  • MD5

    8bbbeb046d27f2db9703d6d6e5f6a61f

  • SHA1

    3660e2805466c35189c2f2340cd63603ccf599c2

  • SHA256

    fd0b663498df5329cb69dab62492a817fe167889f0c240dc07f15f1d1e0c190d

  • SHA512

    fb13e8f03763ff857797033271bc79c855d2e53dd5148562e33fdd75208693ad0187f70c2f7e95da541d973946a2c78c50a102afa7763737705e39c59a114a14

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/s+:zCsanOtEvwDpjBz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_8bbbeb046d27f2db9703d6d6e5f6a61f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections