General

  • Target

    2024-02-29_3e66b3716e8463080c0cf4f266727a2f_cryptolocker

  • Size

    70KB

  • MD5

    3e66b3716e8463080c0cf4f266727a2f

  • SHA1

    a95bcbb3c9725a8dd25ded981726ccf35b8fcf8c

  • SHA256

    47c66dd3aa989327ad771cfefd75d7dce8c9fd997364be3f9d31e1dd19960d6d

  • SHA512

    00ba66c191eee3cb8156f2dfbd59e5c6c8153f076b6c5b482ef9019cfd212b9c2dfc219dec46b9e472ec2bade1beb7cd4c55a529505608b182d2e8f176c0b89e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB/:z6a+CdOOtEvwDpjQN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_3e66b3716e8463080c0cf4f266727a2f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections