General

  • Target

    2024-01-29_4fbcc38be93166fde31f23d6b20365d6_cryptolocker

  • Size

    75KB

  • MD5

    4fbcc38be93166fde31f23d6b20365d6

  • SHA1

    d3f37e66cc067f55147419c49860612bbcb01b67

  • SHA256

    c9492e35ae6bc4133fa7521afec0c3134621d1702d6d5ffc8a80a4857faaba0c

  • SHA512

    1f5db70a7772912a98311b5e03cd338d3fd82a52d04a1198a89e20e635f7de2e42410a3696dbe300b16886cdf872cf09624c24f61676fd3c7e19fe0e6c755c9d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWG6:T6a+rdOOtEvwDpjNtA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_4fbcc38be93166fde31f23d6b20365d6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections