General

  • Target

    2024-02-13_41a46fc9d446556e83f77824f9789d37_cryptolocker

  • Size

    62KB

  • MD5

    41a46fc9d446556e83f77824f9789d37

  • SHA1

    3835a564cf193192b8328fe803fec1ab052a843d

  • SHA256

    0b22b96dfd3d162295928f8dc3f18a2efb09baa81fe8a4eb530758a1f4bc05d5

  • SHA512

    d4b096fedb5a0c3a60da261ad099543c486bfb9cca989bab7a321b06e677891c991d79421348d7bc30ea009922f10f36c1fed5d1e7b6aeea403cf10740bafe7e

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoq:1nK6a+qdOOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_41a46fc9d446556e83f77824f9789d37_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections