General

  • Target

    2024-04-17_08f84473edb3537e0440e45e4e7d4abe_cryptolocker

  • Size

    74KB

  • MD5

    08f84473edb3537e0440e45e4e7d4abe

  • SHA1

    1e0e41fbd4f69643f3e4634c24b207203129a19d

  • SHA256

    f18f0f07e8ea7dc9f4d3c880473b752fa15123fb5b9954d65fb8c875cd6f7c78

  • SHA512

    dbbe7a55fb6fddec8d78a69f27df98ee5514f510263af1c9a9c4101c593082198a86f428c90d007faabf486242ad45c7ccba4750173d8528e5c6b901f155b55f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFk:1nK6a+qdOOtEvwDpjO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_08f84473edb3537e0440e45e4e7d4abe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections