General

  • Target

    2024-02-23_8a1ea16fa6b2bfa3b5b822b7c088aca4_cryptolocker

  • Size

    62KB

  • MD5

    8a1ea16fa6b2bfa3b5b822b7c088aca4

  • SHA1

    2c73bf04689b8ea9059438c35a0e9af4320c2700

  • SHA256

    429f0990c4883fbb1708972402617fca272c90a20fa6294490f6b43501711ea8

  • SHA512

    30fc9101cd8f820099aadd0e99be78c8463606e0947343049fb4a2390fc676b2ab3bcf19266bbe94aae2f505d27ca6123dc00c0a73f03da1b731d5394d20dca8

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5S9UEp:T6QFElP6n+gxmddpMOtEvwDpjwa38L

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_8a1ea16fa6b2bfa3b5b822b7c088aca4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections