General

  • Target

    2024-03-10_4473318987dac883dce4717efc3d8e3b_cryptolocker

  • Size

    115KB

  • MD5

    4473318987dac883dce4717efc3d8e3b

  • SHA1

    e8481ecb055e5aa465c9826d98c25a9c46bb4a15

  • SHA256

    7fc7d9415a8edb66e6d04083018224dd732ade1655b49232881707058d3b1cbe

  • SHA512

    8817c54684ff0fde2b51ee99084d4a2f305a392c118446d743ff8344b000b6011f33f3b35864103115ea4011df9b588828b09277c5711a8a18f8ae570593d21e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/Z:T6a+rdOOtEvwDpjLzA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_4473318987dac883dce4717efc3d8e3b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections