General

  • Target

    2024-03-05_b98952c81041484f60910be1988345a1_cryptolocker

  • Size

    79KB

  • MD5

    b98952c81041484f60910be1988345a1

  • SHA1

    c6219883204a8b30f3ec2596623930d9da88bf4d

  • SHA256

    338aedb9c491c84701f4bfe289cdf6bb0fd499ccfcf805ab8f573d7f81b4fec7

  • SHA512

    d518947add44803f96e843f6d428e4422c3d9d279b50d30774e999c015dfc31559012288e18d33cf435c3bc7a9bbde2479decc0b4e4c843dcac6ca0db3e8cc80

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyB/:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_b98952c81041484f60910be1988345a1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections