General

  • Target

    2024-03-08_d4c024f81dd723ae4ad9254e92c41fa9_cryptolocker

  • Size

    118KB

  • MD5

    d4c024f81dd723ae4ad9254e92c41fa9

  • SHA1

    40fefb02d22c03446139767327612eca115453d8

  • SHA256

    cf470a057d3592aaa74e81c2ae64cff3577ec56d03ca95ba5734d1bae04c3eee

  • SHA512

    55d41543a86fc5f51fa7d497d6b439620aeb94485f64bbfa98df6da1e6bd1b25c0f75c7353233ceb56eca75dd332b42374f37d2a9ecf75726970b40b22e798b4

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qa/:z6a+CdOOtEvwDpjcz1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_d4c024f81dd723ae4ad9254e92c41fa9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections