General

  • Target

    2024-02-03_f908c0a379c6c747fff5b18d89c3d995_cryptolocker

  • Size

    116KB

  • MD5

    f908c0a379c6c747fff5b18d89c3d995

  • SHA1

    e3f1e5581258c6ac75d5ff57400b117eb0ceefff

  • SHA256

    09f95f3e70307bca865a5e2cbbb5a7608c053e713f9847b991469ac75a6524a2

  • SHA512

    648825fe9c02917369cdf53103f35c878b6c063d0b90a8ebfa54863b7356fe8a0e97412a1bbe917f55afdb749cb4d43e305d6d55246f431e76321218149f36df

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01G:z6a+CdOOtEvwDpjcz4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_f908c0a379c6c747fff5b18d89c3d995_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections