General

  • Target

    2024-03-08_be0a1e6019092d93074ab284537ecf74_cryptolocker

  • Size

    68KB

  • MD5

    be0a1e6019092d93074ab284537ecf74

  • SHA1

    0d1d33eb43f5a503367a7bd6b3147451319873fb

  • SHA256

    4bb6b3a7efa832796c102fdef21dfdd5d859905913a3699e4dcc3af335706b68

  • SHA512

    8c64b7fd8689b751f16fd8d2f72bf9aee575510089f5557b577028ff06e0564eed7eb8ecab6b1b22376de362623e634693bca9109be16d29e21fa07e25d5efc4

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvCbDa6JS:z6a+CdOOtEvwDpjQH4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_be0a1e6019092d93074ab284537ecf74_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections