General

  • Target

    2024-02-28_b3d63c08b0e3ee4b32de86935ba9062e_cryptolocker

  • Size

    64KB

  • MD5

    b3d63c08b0e3ee4b32de86935ba9062e

  • SHA1

    749731063cf48d2b7fe51cd38081696d89fe614f

  • SHA256

    de441fa4d7e0ca245c2643c4a8124a90fb74d7c5de3b6f8c8e3c42e5128c0690

  • SHA512

    9b6825d292851ef7c8b5fe488e18ae7db8f4d2d479a987926603d7803e597f335e6523527a502e2c4fb7879cb7743815138263b87de47a6cff8ff567a57d1d6d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo15:1nK6a+qdOOtEvwDpjt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_b3d63c08b0e3ee4b32de86935ba9062e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections