General

  • Target

    2024-02-21_850bf6aa7614ccc57d2d0d71e8776570_cryptolocker

  • Size

    80KB

  • MD5

    850bf6aa7614ccc57d2d0d71e8776570

  • SHA1

    8b10dd7af13f97d31100c1d837d1ef9cf7884a58

  • SHA256

    db487e47c4b6d260ae69e01d3a7f7ec73310c4ec39553056390c29b50630086d

  • SHA512

    7e531bbe13b38a6f7205dd897bb79017d73e836e950fa10ae6f87b43bfc910ec8b061589416a5a0411031eb5d42fe1f2b056be04bf5c668552898bb282a6d470

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0by3:T6a+rdOOtEvwDpjNtWa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_850bf6aa7614ccc57d2d0d71e8776570_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections