General

  • Target

    2024-03-08_63f56a72294b3aa337c4f5099a319b5e_cryptolocker

  • Size

    82KB

  • MD5

    63f56a72294b3aa337c4f5099a319b5e

  • SHA1

    3bd6edef52bdc8943f63c35650372a608f4fd0cc

  • SHA256

    2ff860b0be42c8df7659c1898590a980ba8775cfb24be96b5fda0687d1e0ab98

  • SHA512

    e0b332e0dfc6c8bf3629051f2e517c52485ed2e60d2c2e7b6f2cc67545d15e4d428f356ba373caa86f42967790218049f9bbc3b8619f5e92462a34155cff45ab

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7w:T6a+rdOOtEvwDpjN8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_63f56a72294b3aa337c4f5099a319b5e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections