General

  • Target

    2024-03-07_42e977fcab17e7fd2652fb3612dd6832_cryptolocker

  • Size

    64KB

  • MD5

    42e977fcab17e7fd2652fb3612dd6832

  • SHA1

    66d047673f04cd9ad9e9be78c39fd40d4622d403

  • SHA256

    b4b6d47dcd8bf0b7e94ca40227aaa99ab8dc4dba37c7d511ad3bf0a791580c0a

  • SHA512

    c263e9f515c0525fb14ca7d661d1d543285e74f8dff8c2b35b2d6e9700198809f66d75645620976cb901e2597ed60b477494f4273dc19fee5119550c68b6c398

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7I:zj+soPSMOtEvwDpj4kpmeLm3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_42e977fcab17e7fd2652fb3612dd6832_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections