General

  • Target

    2024-03-06_f599dcffef8d8a8b097b0910b9bc33bf_cryptolocker

  • Size

    93KB

  • MD5

    f599dcffef8d8a8b097b0910b9bc33bf

  • SHA1

    b485c0a50cf064d36e986181ab9132c89a91f24b

  • SHA256

    54a7646392ce3a654aa7540ba084b262ce0da548171bf58b930f429a2385edab

  • SHA512

    c446eb1316da179c336309a18f1d5ff36704c1124235350e5524676a8b1a99a7e648b7c177db77bbfc11a3977e58f220fbed89856e26b8945fd2a8b1cb49f3bf

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/d:zCsanOtEvwDpjBd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-06_f599dcffef8d8a8b097b0910b9bc33bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections