General

  • Target

    2024-02-17_3a82214ca4c13dd6f16ffc09705655bb_cryptolocker

  • Size

    71KB

  • MD5

    3a82214ca4c13dd6f16ffc09705655bb

  • SHA1

    db899cedfa48eaa02e0a8516f332b5ceef060042

  • SHA256

    0013487202fc03e4a8d26fead43cc20b063200aa80933b2719d6d85436550306

  • SHA512

    aff38fbb3d47595740f18f4aa0738e2bd91886893fa2175ecc5fbb4e3bc4904d4d299aea7a430f4b9bc03a8107d05e97bb3ee2fb22b17697e8a28fb283e7ca32

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVK:1nK6a+qdOOtEvwDpj9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_3a82214ca4c13dd6f16ffc09705655bb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections