General

  • Target

    2024-02-23_85e619f9f69bb4436d6de5093ad80613_cryptolocker

  • Size

    106KB

  • MD5

    85e619f9f69bb4436d6de5093ad80613

  • SHA1

    385e792fa72f5354ae4c8c903aed4ce2139c445c

  • SHA256

    334e6f2661e2f391b7a271633db3a6f40bea49f226128cb753b4a9a45adb1ad3

  • SHA512

    0f266009f8672b26a3f603a09aefdc1141c9c5582896a33738e0673530236bfcdda9d821d7dceb9299abf7b6d2963ac17326e2223d1513e28420a2cc5d74a69f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfh:1nK6a+qdOOtEvwDpjF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_85e619f9f69bb4436d6de5093ad80613_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections