General

  • Target

    2024-04-11_8b43dd80c07a44a43e1b5405542cffc6_cryptolocker

  • Size

    84KB

  • MD5

    8b43dd80c07a44a43e1b5405542cffc6

  • SHA1

    5274da1e81e25d0b4db6940debd6193ff694145f

  • SHA256

    61353dc03901181f46ccaad082c480d0537410d55d8c8cfce6f3fb1d168f2c3e

  • SHA512

    f05a5b6abd7221413fcdf615090d529486bc6448c6496fce0d94f7a0fa5274ee349977df3faec6a4266280285e67a4889028209a96b06a0a6ccdc06e52b7622b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R0:T6a+rdOOtEvwDpjNZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_8b43dd80c07a44a43e1b5405542cffc6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections