General

  • Target

    2024-03-09_4f6e8ae64f5006e29e94b922230403e1_cryptolocker

  • Size

    48KB

  • MD5

    4f6e8ae64f5006e29e94b922230403e1

  • SHA1

    caeace6b823cb2a1157244105615e9057dd0d855

  • SHA256

    387b75a4e7d4080f0bf4b1e3b759c1098d99d56917bd2f15448cf6beaca03e65

  • SHA512

    f05ce926e44da2a3da452ff1e6bc2f9eff89f12730e8ff76e9ade4e5627d877f845c56078d466b49ded6f06a35bf52c9eee9726697dbb710317e00d0c96c6bd6

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1Jb:z6QFElP6n+gKmddpMOtEvwDpj3X

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-09_4f6e8ae64f5006e29e94b922230403e1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections