General

  • Target

    2024-03-07_434d4dad1531fa4d2ec441ad91aa9be9_cryptolocker

  • Size

    56KB

  • MD5

    434d4dad1531fa4d2ec441ad91aa9be9

  • SHA1

    219c095137d71feda35d1503028a51d89aec919b

  • SHA256

    244829d2595a67ac7645b7d6675fd6b2f13dbaef200ef7b38917c2362ba2d9e4

  • SHA512

    ef15ecb9ad07c815c4fc769a19813bdb215cafc039bf9140f674dc0ed3cb3cafae04c7aecc1576fa2b5d73f66c7d67bcdabd41d3d90d4cbb3c83c4ca53d36fde

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYa9mp3:z6a+CdOOtEvwDpjQ8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_434d4dad1531fa4d2ec441ad91aa9be9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections