General

  • Target

    2024-03-07_651f3256f8e18a224a35cabfcc900838_cryptolocker

  • Size

    116KB

  • MD5

    651f3256f8e18a224a35cabfcc900838

  • SHA1

    d322847269b367fe2b1145642dee4b026be00e4d

  • SHA256

    853ccf8fe8aa5befd6c1d5060caa35efbacd2e7490b80ee26deca2061601cc47

  • SHA512

    3c436f012c34f4e887b6344242eb394fd6ff7899a270946d156de5139874f759f2ebff986e3af127d3df6f7c1554015e50ea4cde7b25ed208f07d22369db663b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9+:T6a+rdOOtEvwDpjLzq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_651f3256f8e18a224a35cabfcc900838_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections