General

  • Target

    2024-04-24_b8f0077ee709176fe4b2b747a9eeb2b8_cryptolocker

  • Size

    55KB

  • MD5

    b8f0077ee709176fe4b2b747a9eeb2b8

  • SHA1

    71ca090af8caf3af24033b65f99f7f3955353448

  • SHA256

    c3fa89b8ff711fcdc61ca2956835311e3492d7218c405f2c4e9abbf8b811773c

  • SHA512

    b5486d606ae117c3bee4ed6d4d1ffbd4faebe6a1048d2f187ad44f0e57847b891df76078c9ecea36787c7c650b6949bb1a946ded73253beb00d57612305c534d

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+hh:bP9g/xtCS3Dxx0Jhh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_b8f0077ee709176fe4b2b747a9eeb2b8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections