General

  • Target

    2024-02-20_b8e1c2aba60f1fa24b960566a3b4bccd_cryptolocker

  • Size

    67KB

  • MD5

    b8e1c2aba60f1fa24b960566a3b4bccd

  • SHA1

    4af9c696f58a5047cceff2d5099f8eef842060e5

  • SHA256

    fd2bc55c3f1c0785f96be17eaa83c33082a6ff2e2d9dba5cb4a1635a7f45fa0a

  • SHA512

    b887ade266e4703baced6649a1ffc583155972674e97f6bf7a417dadd5135d79388c5ce139e47716d0fab7b595630b0ffa2e2d1357767406649f0870c37e5cb0

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB0:z6a+CdOOtEvwDpjQi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_b8e1c2aba60f1fa24b960566a3b4bccd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections