General

  • Target

    2024-02-22_f4e3cfcf5007c8bfb98f0e8eef091c6b_cryptolocker

  • Size

    108KB

  • MD5

    f4e3cfcf5007c8bfb98f0e8eef091c6b

  • SHA1

    02842650c5ef3bf1f5df3e67647d484f742db019

  • SHA256

    09a42a771a8e161270d938d8f7c3a14c02ae5f3588073f433d760f8f1f162f4c

  • SHA512

    0f4432ac56aa40404d2fded6d09a71032415eef07658eac44067e0528fbce256f51c33824b45c3911ba8284139571be8714321ab28b057706a78ea6074b65628

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksgEne+:1nK6a+qdOOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_f4e3cfcf5007c8bfb98f0e8eef091c6b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections