General

  • Target

    2024-02-28_8b19e0157eac06623468027dfd11a9a9_cryptolocker

  • Size

    105KB

  • MD5

    8b19e0157eac06623468027dfd11a9a9

  • SHA1

    e2fb007e4a35f918344ef51365f6a296d7250666

  • SHA256

    085e0eb1d0db5d2ce35eb5395b5610dfc2063a11fcc922a1881c3f1d64c109a8

  • SHA512

    d4f37bd9d92b2dfaeca8ab0562763a0fd09be4e4eb19c8500d70a9530e45fa957aa9e76667224523c8510f62c6818c0d24574546230efc2347650cd98d2fab7d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaLr:1nK6a+qdOOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_8b19e0157eac06623468027dfd11a9a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections