General

  • Target

    2024-02-22_b481b4af033679bf5411579fe9136e1a_cryptolocker

  • Size

    62KB

  • MD5

    b481b4af033679bf5411579fe9136e1a

  • SHA1

    b26516461c0e24f1af856543d1fdb1089c9af0ee

  • SHA256

    3acdae86b9337a261d987064f07ad6d86d8a3c9f429370f85014b2a6910bf88b

  • SHA512

    2d11dab0809ef8d81fbf8968ed6c1247d5960c9051e18f40fee931ed3bef9531d3ea8f0a0679d848f5da6eb5081e9c6bc1e1bfe8ce459eea7bc1e97030604ab3

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5ST+:T6QFElP6n+gxmddpMOtEvwDpjwa3P

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_b481b4af033679bf5411579fe9136e1a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections