General

  • Target

    2024-02-13_3ac29cfc88b5b0c4f6546b9f3d8ebc74_cryptolocker

  • Size

    77KB

  • MD5

    3ac29cfc88b5b0c4f6546b9f3d8ebc74

  • SHA1

    8c8ab700a7af23d12776ee3ce3797b9a2aff578d

  • SHA256

    bf792e87269f348287053d42de16743c91a8b75b97c9d73fe9f5d482e1e6c01f

  • SHA512

    ed1dcb2432da356921caa0e92c576ce47123a67d61b44c3132438126356a11ce0b192e270b2dedd095fcbef590ea2c6813326a86cf94d99506f46c7f2c6868af

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qj:zCsanOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_3ac29cfc88b5b0c4f6546b9f3d8ebc74_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections