General

  • Target

    2024-03-14_b0db1146084efecbdff44c41b173039b_cryptolocker

  • Size

    121KB

  • MD5

    b0db1146084efecbdff44c41b173039b

  • SHA1

    3a1c3bec68dc5e3cd19dc9648679e29accc81d00

  • SHA256

    78264e985d4734bbcfe93207b0c21c17b125e7c4aef58e0b024f7435b7957ae1

  • SHA512

    4b6713d43afe6a59219d600035d595c0dca9d0754d6b0c26264cde9e0bf0fb603900f06ad045aa3178e84f432039e75ae245047fc2fee1280a1795aa67521a0c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy9t32:z6a+CdOOtEvwDpjczn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_b0db1146084efecbdff44c41b173039b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections