General

  • Target

    2024-02-04_11cd3d2a40ad335fede3a181987f536e_cryptolocker

  • Size

    82KB

  • MD5

    11cd3d2a40ad335fede3a181987f536e

  • SHA1

    03f88a3d80c70d0547a6581a84dc4aa1c8191311

  • SHA256

    dea980554e858b5273e104a8be95dd57ebd084e947b515a096a4defdfc73d50b

  • SHA512

    78a9957df7e6b2b973b4db2e3c85d45f555ba8c3f8b679156ea815b6a6e81187e863d6581ed8aeb32bf13e28bc190354203d7ba9181c2092c2ff5d3775b4b7de

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7/:T6a+rdOOtEvwDpjNz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_11cd3d2a40ad335fede3a181987f536e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections