General

  • Target

    2024-02-20_4c3b95b0b4c0272309c81c6cad0df1de_cryptolocker

  • Size

    110KB

  • MD5

    4c3b95b0b4c0272309c81c6cad0df1de

  • SHA1

    2aa16527625c503ed7b736621ac9df1f873594df

  • SHA256

    12ed7dba4892ae178b66aa22d58fc023a318d2e6b7a8e6664d2bba23e8a75b2d

  • SHA512

    a60c5becb9c092a3b656fc84f9b421fee5f8cc9bddb24f232ebc47e6486a1d81bbcbfcea6491b1d933f368b3d770633d963d1cdbe58a59f3bca12703e016b3f7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwMgk:T6a+rdOOtEvwDpjLzw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_4c3b95b0b4c0272309c81c6cad0df1de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections