General

  • Target

    2024-04-17_01bb8e839be1f1dbc1e786ecc62e7969_cryptolocker

  • Size

    65KB

  • MD5

    01bb8e839be1f1dbc1e786ecc62e7969

  • SHA1

    91df917dca23f1550da0dbdcea733669fb8870e9

  • SHA256

    ce2ccaaecc088c6c0acf9ca428380dde9c13e4195caf4ed2d27430d744d86fae

  • SHA512

    fdd14c45b111029620969ddf0f7d7bfe70ec25447e45ab4cca1ed7ea71267bb6da404fd303286a95616a3c72d2a0e13651e11fbed3ac216c0d24733a536d0941

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kJ7AKR:zj+soPSMOtEvwDpj4kpmeLmQlAy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_01bb8e839be1f1dbc1e786ecc62e7969_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections