General

  • Target

    2024-03-08_a3d2bdfadfa4df72c16bc4fdd1f81b64_cryptolocker

  • Size

    86KB

  • MD5

    a3d2bdfadfa4df72c16bc4fdd1f81b64

  • SHA1

    61dc302a7aea25d3605bb187c52226e61a89088f

  • SHA256

    a437062d210c0dd282e10f9967b65c72c8a69407f8aa89bf59144a8f4c1440da

  • SHA512

    c82d314261d29fea5cd7ae9ae04601349f279b5511c113a9faf009ab4efc9cc1c590a01a25f207c5c6b4646cba1bb1b7a6770a2b0d4e83b0b9b22aef6e238420

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj3:zCsanOtEvwDpjG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_a3d2bdfadfa4df72c16bc4fdd1f81b64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections