General

  • Target

    2024-02-12_cf3cf4f6754735b3bc907272cd2efd58_cryptolocker

  • Size

    65KB

  • MD5

    cf3cf4f6754735b3bc907272cd2efd58

  • SHA1

    686b6cd4a7e2e8db31e7b1069e8368b74745876b

  • SHA256

    e2cd6fee4d8126cddbfc968d3313650e824263ec29086b53dd01dc3f981cc6dc

  • SHA512

    7ba71261de08649d3e7645fe72b5f179eec47cf3594f01cafa4c3e39f91eb1a1122d436e3a1b76bd20691cb1a5b4dc6478054ec890dcaf3a99d82c071aeac4ea

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXa7Q:1nK6a+qdOOtEvwDpjD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_cf3cf4f6754735b3bc907272cd2efd58_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections