General

  • Target

    2024-02-04_3a1a4ecc7efa364a09574044a518a6d8_cryptolocker

  • Size

    64KB

  • MD5

    3a1a4ecc7efa364a09574044a518a6d8

  • SHA1

    0e5eefa267003e43954bc2927a71c93a9ef549cb

  • SHA256

    5c2ad327b65eb50501130a01b3aa6d6bbce4ba4c7e928f175658f8187f5a51b4

  • SHA512

    0d320673a71b6958e6b079e8f5bd44c2354ce8cf0cce9b2e6810d6fb6b225801fd6d412300bd27ba312748e002f70e515011f367af34a49dfa51f74f28f1cbf7

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjc3P:1nK6a+qdOOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_3a1a4ecc7efa364a09574044a518a6d8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections