General

  • Target

    2024-03-07_f4dd25a6c36ce5d678f64e8564a65332_cryptolocker

  • Size

    115KB

  • MD5

    f4dd25a6c36ce5d678f64e8564a65332

  • SHA1

    97079d710c826822971000b4b9f16b78fea23c33

  • SHA256

    833c43e2f7d84613ba3c4010db60e8298f27d4879ef551c44a0682cf9f10c95d

  • SHA512

    d9f0eabca68f8795a058c10054528d3f36421e09cf1323c6fbf8c89eac500d430fb179ab6cc3c6d9bd52b866e5c12f4178105cb9c27ed76ff37fec9635ac5de9

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01H:z6a+CdOOtEvwDpjcz1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_f4dd25a6c36ce5d678f64e8564a65332_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections