General

  • Target

    2024-02-21_3957b69c246f0fdcf78e5197ba2db864_cryptolocker

  • Size

    105KB

  • MD5

    3957b69c246f0fdcf78e5197ba2db864

  • SHA1

    74f302e05e3b114f23c72360f59d0df23577fda7

  • SHA256

    27b4134cfed5010dc4f4a476d3f50d759231ddde57cbc98cb2b117ac0a47ec45

  • SHA512

    5e7bf44d7fedab4ca70b4631ff3635d6d3c97894bfd50b105cfa2a95b247b164a9aa05778ce8b68b9387a15403a762ca683edf2c255e397c23be1cf7034a84ba

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaLA:1nK6a+qdOOtEvwDpj9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_3957b69c246f0fdcf78e5197ba2db864_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections