General

  • Target

    2024-02-23_b2a7baf43aa51190896b4e6da02f693c_cryptolocker

  • Size

    81KB

  • MD5

    b2a7baf43aa51190896b4e6da02f693c

  • SHA1

    8c36410e945903b846bf75f661af5c3e5b16298f

  • SHA256

    0bf9b87d896f93fe38f5875c410396d135412d83f971157fc666a98dffc26b88

  • SHA512

    970a180ea7e7135341b420bde64a401b169d5b1a1a3fc53c86bc3960c7009c4cf85642af32b6333a8fd45f6b39b7e1e82680d9be3febfd1fcb73375e04a73937

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0iq:T6a+rdOOtEvwDpjNtQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_b2a7baf43aa51190896b4e6da02f693c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections