General

  • Target

    2024-02-22_dbf5fb9daccb9852d900368730e40cd7_cryptolocker

  • Size

    64KB

  • MD5

    dbf5fb9daccb9852d900368730e40cd7

  • SHA1

    f9fad778f0cc4119b0eb360191ba3cc3fac3788b

  • SHA256

    efadc262ffa38992d018a7f78060bd038d1c333d2167435081798c6f29e4f28a

  • SHA512

    2725f4574dd6b98a44082b7ebdce05743c64c0a25bc1d5aa34511e9421ba365992a7d5f119685f5406a58c438f254056443a24a194e1bf73482703598b87ee09

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo5E:1nK6a+qdOOtEvwDpjE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_dbf5fb9daccb9852d900368730e40cd7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections