General

  • Target

    2024-03-06_704ed3b97d65df61847e6612a7ad481f_cryptolocker

  • Size

    106KB

  • MD5

    704ed3b97d65df61847e6612a7ad481f

  • SHA1

    46ee4b560aa85c981fcab48fa55726048ee6abf4

  • SHA256

    7fb18009ff7d0a1c45c5a69a6c4b00030d4557dda0eb223ec5c87d81c8901e3b

  • SHA512

    3dbee291b32b59343ee094f7beedc1b9b340586ef781c4fecb906025c45af11776d2c208b97d8e9e2edacc5635048941ba17fa9620dd09b0d84390cb459e040f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksurTG:1nK6a+qdOOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-06_704ed3b97d65df61847e6612a7ad481f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections