General

  • Target

    2024-05-17_8b4389fcd39e6bcb128816fc847bd20f_cryptolocker

  • Size

    80KB

  • MD5

    8b4389fcd39e6bcb128816fc847bd20f

  • SHA1

    b895eafe43ea201cc55362762cc1ec8659fca421

  • SHA256

    d0a7f6b75303f8874947440ca86fb91989165bb7b604f1df068e68b6be9bcba4

  • SHA512

    87607a1404e799c6ed7f1efbc21e7cc0306734097bbccef27ecec25104a26bdb9592ccd59961df3f811705d6de2a37e719e94592aae00a9b360a0928417c4d5b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QM:zCsanOtEvwDpjY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_8b4389fcd39e6bcb128816fc847bd20f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections