General

  • Target

    2024-02-24_85d3c026fc94e571bdf2ec7cb3da139e_cryptolocker

  • Size

    71KB

  • MD5

    85d3c026fc94e571bdf2ec7cb3da139e

  • SHA1

    6a1a1e091670dead03a0e329be55c08809e851d7

  • SHA256

    10091de5dbaa44437dcc83cc8e21e433c80dc6f7aba802d69a67316c1c239679

  • SHA512

    4d1aa2a19c0461307a4542511612f23f4b391c88259c9473fbdb9de91413721c11a729ab7d0d0b856969e3c8b62980449bd3c9c4207697de59cd62cf50758b78

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalr:1nK6a+qdOOtEvwDpjW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_85d3c026fc94e571bdf2ec7cb3da139e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections