General

  • Target

    2024-02-04_6310ed3faa9915de46c59c63038a7eac_cryptolocker

  • Size

    56KB

  • MD5

    6310ed3faa9915de46c59c63038a7eac

  • SHA1

    39d84279a78e0d601eb0beb658ca8c402b399ae4

  • SHA256

    4d7b0be7ff0a54f6e0fd8ae1e91583eb30a89f598b8fae9673e29e3212edc08d

  • SHA512

    8bd4d2d3d4e9e795b364f6b98dc79291b1b9c4ea396539dd1097965f197880ce99bd8de5d152e159cdb04ab2e198305ed8d3faa4ffc4da12e362c6c9d5e0bee1

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpyn:zj+soPSMOtEvwDpj4yu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_6310ed3faa9915de46c59c63038a7eac_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections