General

  • Target

    2024-03-05_f405515e992ac860f875dbc69b89b160_cryptolocker

  • Size

    48KB

  • MD5

    f405515e992ac860f875dbc69b89b160

  • SHA1

    5005f887c0b68e7adcfaaced024b8dac89e85291

  • SHA256

    93488bdd1a370809a93b1519ef670b66441f5a06098d324696070f4c521bed9b

  • SHA512

    312189c3483f4c9a6afd3f6242accffec15dcc5197f8debfef3acd39f268204797390b51941e4da3c47fb36d31dddbd5bf55811802abb114a21cce89f99b9c55

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1O:z6QFElP6n+gKmddpMOtEvwDpj3w

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_f405515e992ac860f875dbc69b89b160_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections