General

  • Target

    2024-02-19_a3ed54d84cd4b6c9a40db0eea6063ec2_cryptolocker

  • Size

    71KB

  • MD5

    a3ed54d84cd4b6c9a40db0eea6063ec2

  • SHA1

    af1c8cc0a57e878ecd4bfdf29e05e8d0a816db3a

  • SHA256

    38b3edf1f213c8ffe005e2e51c0c23789cae06c3cfe813c4bb1777d70f1e1c63

  • SHA512

    a2210b2ba341c5fd43d9fc133c478aa5b5ecaa3c3bb6bf02c7261984e1ad41beb98ef848c83220260d9e601f923b0c28761d2f3406f57a1f96e8969e3f5b34fd

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVU:1nK6a+qdOOtEvwDpj/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_a3ed54d84cd4b6c9a40db0eea6063ec2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections