General

  • Target

    2024-02-28_8e51e899b30358c74067b2813249b5b9_cryptolocker

  • Size

    62KB

  • MD5

    8e51e899b30358c74067b2813249b5b9

  • SHA1

    4ffbd1fc55a097c2204d04528c3dd1b2f31f6b3e

  • SHA256

    b407585752a74ea8d079778d71e374aee47ab2e9d6f6fafae88cbafc01194bca

  • SHA512

    d32a556f6a5b6f0e63a28aeeb3729e5b2aba86938c2ef3f6576a7346bf616e29b9e8256c542df65143e5862a9ff42213cb7d1350bb62e3ac0a524b79fd3feba6

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVPw9:zj+soPSMOtEvwDpj4kpmeLmnu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_8e51e899b30358c74067b2813249b5b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections