General

  • Target

    2024-02-23_82bc0082501b6183a35a2960fafb8a3f_cryptolocker

  • Size

    63KB

  • MD5

    82bc0082501b6183a35a2960fafb8a3f

  • SHA1

    9b36eb7d42fbe973520b03b94fc5e6d661b89ca5

  • SHA256

    3a2d57b891628feee90c690c0995792c0925fb892ffbdce7d2ff988a325a6812

  • SHA512

    f47807a7f75dec9792279e2f5c6609417f0e776cf0c2e61a2949ba2e24f497c7211094054104dee4577ad22bc710d4266abd1efa69fb3ac133bceff23a0802c6

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5k:zj+soPSMOtEvwDpj4kpmeLmQm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_82bc0082501b6183a35a2960fafb8a3f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections