General

  • Target

    2024-02-24_8da636bb4c536ef1dab91df89a9d561d_cryptolocker

  • Size

    74KB

  • MD5

    8da636bb4c536ef1dab91df89a9d561d

  • SHA1

    92ad1d206de8939b3062d5d2ebfe457169fa581c

  • SHA256

    92e033abd5965b7e70e60cefc2b57988d0e5bcefe5cff78138f73079ccb89519

  • SHA512

    9a5e7add85967dd395d4b4074ca837ff0b20ff14bb4fd51dc7b6453b6606ab39807f56f3e9e6e04ee239882337a80f5f38b1084f9a36531464b0709f863336e3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxyz:T6a+rdOOtEvwDpjNtHP7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_8da636bb4c536ef1dab91df89a9d561d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections