General

  • Target

    2024-02-24_bfc73b891f573001920b0df6cb08a622_cryptolocker

  • Size

    81KB

  • MD5

    bfc73b891f573001920b0df6cb08a622

  • SHA1

    eca575398c892c47b068d54699674257a01ae0bc

  • SHA256

    ce5739a439ec0051dc9e9fd05d213611d8c098cb5d982b1a5945703216f077ed

  • SHA512

    3c4a0bfbbdc9e5e1b34d607248a8af202b61fb8b80e59c5fc2bd35adcb4540426bf59d6db775a55e4275c7c03c40c361fe6712ccc7d4571243d3211f5383827f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdeP:T6a+rdOOtEvwDpjNtG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_bfc73b891f573001920b0df6cb08a622_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections