General

  • Target

    2024-02-23_bf271d38db5027061a65f466cfcbcd5a_cryptolocker

  • Size

    109KB

  • MD5

    bf271d38db5027061a65f466cfcbcd5a

  • SHA1

    a23c7a781bb637666e95f2bbd2be65a1f987b67e

  • SHA256

    de9ecaab33a950f98a03a7f88d31c0313382a4ce4c330501cd9000a0b615d68b

  • SHA512

    b8ab697f8118817844c7b47a1e996a1dc058df13e12a8b1d56b963d0211e31c54974fce3de2e7077d0d230c9a3fd574b4fc606a7960a887cb4971741f6066952

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMghJOd:z6a+CdOOtEvwDpjczU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_bf271d38db5027061a65f466cfcbcd5a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections