General

  • Target

    2024-02-22_df85ff0a89ca8352792e8b69c61c7f9f_cryptolocker

  • Size

    103KB

  • MD5

    df85ff0a89ca8352792e8b69c61c7f9f

  • SHA1

    c2f6f6437be8684d3fb1c5c38cb3947ae2d5a115

  • SHA256

    048f4aa67ee5d5da8208cfed91c2a4f7855062999d6a0668107dbe1525e1f52c

  • SHA512

    88a80da19fb89b577ff09f61bcb9031b697881153eb012c342fc30e48414144f2f58852f1cdae20f688bacfad2d982754de7caae77585f1c64210c28f9a12f0b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks0L:1nK6a+qdOOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_df85ff0a89ca8352792e8b69c61c7f9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections