General

  • Target

    2024-03-13_bcbd1808f5926cc9383f420df2688c2e_cryptolocker

  • Size

    118KB

  • MD5

    bcbd1808f5926cc9383f420df2688c2e

  • SHA1

    9b82200f3de755a9d646d69b0c08ebae949637da

  • SHA256

    b2752ec8b956a5d7fb988d1c5b2f57b503b0909ecbd2911dc71dbab3f7238ebf

  • SHA512

    286503685fe1a653d289e6ee936604201792029cdeb61704c18aa370ceee93ebd10b8f47a61235874571ea3af32c5f5545105d4a11b96c3d3b55209aa273fc32

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01rBE1:z6a+CdOOtEvwDpjczM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_bcbd1808f5926cc9383f420df2688c2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections