General

  • Target

    2024-02-23_8c7e85382dfad962b3ba14dc6e6d3431_cryptolocker

  • Size

    61KB

  • MD5

    8c7e85382dfad962b3ba14dc6e6d3431

  • SHA1

    93d587c17d044e4c1e557adae13ed8ee0dc23b33

  • SHA256

    02bad2c7ba7a27f82acb9e8e4da8924dccfe504db08c2cf56f3519f250a08a8d

  • SHA512

    58f07c2047c6148fe56a685da0abd6825713ce7167dbfd3fd58d146140292a608acb79a606e37738b1a9f5d6284e28168656acff4f793e1bc5d213b80361d402

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAW2:z6a+CdOOtEvwDpjQo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_8c7e85382dfad962b3ba14dc6e6d3431_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections