General

  • Target

    2024-03-18_beef34f765470fba3cbaf493fd7ec5bf_cryptolocker

  • Size

    83KB

  • MD5

    beef34f765470fba3cbaf493fd7ec5bf

  • SHA1

    484884b4bf925a334101a28f2c04fc89ffd7311c

  • SHA256

    9d5dff5d44a13cc78fcae853af5cc2e00693341ecb5742ca9798aa8ba50865ff

  • SHA512

    25a968f5f8ddabd560ce8ed8e6dad4c20960f66b57c7075253d82ec9833457f9ea80803c5c8c5c6087fee2a7a901b8a848a40ed9a505267164692eb4c25de8c2

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1aR:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_beef34f765470fba3cbaf493fd7ec5bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections