General

  • Target

    2024-02-23_986fbdb8c18ed9fad6052437b873ca4e_cryptolocker

  • Size

    82KB

  • MD5

    986fbdb8c18ed9fad6052437b873ca4e

  • SHA1

    f321a09f7ae3b3432186c7e24e0da92492facb83

  • SHA256

    d2597b3084aaa6d2776bae8ac734fd2833bea8eca13608294ec509d41184b9ed

  • SHA512

    4a6d9ab4dcb19d7ee1727311af62c35717b1fddf8a4a7d3b75ba5151c50fbed1ce8d71b127981a4754e0b818427d74c2086a98ced1a3c11a0134db9ef9c0814b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vF:T6a+rdOOtEvwDpjNh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_986fbdb8c18ed9fad6052437b873ca4e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections