General

  • Target

    2024-03-06_693e4ab408d618c0362d2413e5df9239_cryptolocker

  • Size

    67KB

  • MD5

    693e4ab408d618c0362d2413e5df9239

  • SHA1

    a23b0c0c77dbe4dd5e3b074f20170f2eae04c93e

  • SHA256

    3eaf111bbb57ed151e77b0e71e0eabff78807bd840afbf9ff2d16e2cb5aa5ad9

  • SHA512

    a4dc4ebf288679b0e913b2231c2f868f123024b52c20e385b1a1c4b063764d1cadf4a27eab6791de8e065f857b9727de79ebdbb7216e3f780f67220751a9cc1b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Uncv:1nK6a+qdOOtEvwDpj7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-06_693e4ab408d618c0362d2413e5df9239_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections