General

  • Target

    2024-04-23_83be89bad1b9a16fa5c3b611d2b7d850_cryptolocker

  • Size

    80KB

  • MD5

    83be89bad1b9a16fa5c3b611d2b7d850

  • SHA1

    be940c3f0f18a5d2cf63be47232042dd333ac606

  • SHA256

    1221dcc5b04b3987e6344558d246157cecd80e91f76411862c7fc263a91c16a7

  • SHA512

    d31af51cf77f77d69759f4d508ab493011af2c1d92116f7e5be2230a76998da7dbab890677e983667141dd908b23452774a93a17578804a8e455643a9eb9340e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Q6:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_83be89bad1b9a16fa5c3b611d2b7d850_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections