General

  • Target

    2024-02-19_3bf605c1f8e1be5840efe5768a1d9fae_cryptolocker

  • Size

    64KB

  • MD5

    3bf605c1f8e1be5840efe5768a1d9fae

  • SHA1

    0d591aa8a413e1d9b830edcc87a600616bcd3f11

  • SHA256

    030a5dcb9741149c11588e1ccd9d8c86de64eda715407540541ae040c063836b

  • SHA512

    a5ad8bc97b6a4344d29c13e60ccabef8397311430f01ad0021ae67cd70955457f64bc1d5c8a689067a153dc4965cc72df3230605fe3a08bdc46c8c2ac79968dc

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoUo:1nK6a+qdOOtEvwDpjt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_3bf605c1f8e1be5840efe5768a1d9fae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections