General

  • Target

    2024-02-22_b0b701586e5f3cb9ca210dc8f029bc0f_cryptolocker

  • Size

    70KB

  • MD5

    b0b701586e5f3cb9ca210dc8f029bc0f

  • SHA1

    b0bb5aefb3654a4466d5078e0396686b9587a84b

  • SHA256

    7c31f0cf14d9c2d9d2d058272afa97a56ae23628b383495d5d2bfbaed625aac5

  • SHA512

    75969eca2f70ef3fcce8313dccef2c57544795ef43b93ab496bebbbd9b9c09a7812c0ee517f01fce847c71628253488cad46a38377c94cf21d23c4487ca2e7d3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBs:z6a+CdOOtEvwDpjQa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_b0b701586e5f3cb9ca210dc8f029bc0f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections