General

  • Target

    2024-04-23_be5c798bea89314a3dfc883383f2bdc8_cryptolocker

  • Size

    52KB

  • MD5

    be5c798bea89314a3dfc883383f2bdc8

  • SHA1

    fd0a871fc282acf26d0c03889b0c70aaedfe7895

  • SHA256

    f8407127a5399222e718a8a5e967f305bf807b311e61ffbc0197e5113038aa3d

  • SHA512

    a038f6567220b5e312a455642cbcd5758714912b1625b914f795bed795b01edd99adbe079cc58cb780a161b8dfa009924623294ab0bba0b64ee0f72eb89c25ab

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOX:z6QFElP6n+gKmddpMOtEvwDpj31iX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_be5c798bea89314a3dfc883383f2bdc8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections