General

  • Target

    2024-02-20_d87f7054a97933505f2220db1ba6e152_cryptolocker

  • Size

    110KB

  • MD5

    d87f7054a97933505f2220db1ba6e152

  • SHA1

    8608afa21354e7765e07fb04e519cd7816bfe665

  • SHA256

    ed74e83ddd72e963b4899fca04bd087cbd0a4e114b4346516ff659a154c3d9c4

  • SHA512

    10726e42d089b5ed20c0a4302548764aac0674e9541dee504abef2ee5444861bfd5e9cc3762ab46eb6051b532f08da8915e044b00ba02f6f7c36763e0a2d70c6

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwMgc:T6a+rdOOtEvwDpjLzI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_d87f7054a97933505f2220db1ba6e152_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections