General

  • Target

    2024-03-05_4b9f80800c13d11adbae5bbe68aa434c_cryptolocker

  • Size

    63KB

  • MD5

    4b9f80800c13d11adbae5bbe68aa434c

  • SHA1

    c4800da8c6f84211f99815774b7d455bb8f1bf2c

  • SHA256

    c71fefab8173c836847549c2053ddaef028b9bee0d5ad9dbb9e3cb7f9bf54426

  • SHA512

    ac026373c2dc1140b88777defe75a9c7ac7eacbb53accaacb0034aa1dd585758a7f3a51c129fa4d246f331c3605a9e7096c56e7921c0b0eae17d8e21635832f0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY7DWjt:1nK6a+qdOOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_4b9f80800c13d11adbae5bbe68aa434c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections