General

  • Target

    2024-02-25_0b11868de245f4c043991cca0549c519_cryptolocker

  • Size

    68KB

  • MD5

    0b11868de245f4c043991cca0549c519

  • SHA1

    d7b5d386a9b4b1824c69f88df248ebb5b56851b7

  • SHA256

    86404eaf53ab6860c4aefbd7657c33646063adb6b2c05457d4b7ea6335318c7f

  • SHA512

    a15dbadaf018906a8fe51ea0aea30e50a96e2e6b53686b2a30b845d757234e47e5dc334330bac7c166742bf044396e0055a02e42bc936f10856e891b15a2a9be

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBVG:z6a+CdOOtEvwDpjQm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_0b11868de245f4c043991cca0549c519_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections