General

  • Target

    2024-03-11_34513ccb609bdf021b1929df22c34df0_cryptolocker

  • Size

    65KB

  • MD5

    34513ccb609bdf021b1929df22c34df0

  • SHA1

    bf57f02d48b68e2c39764691d548324f3ea348db

  • SHA256

    f245184fb9c9b425f699ceb775d69d219b8d3ec7133021cb20846e48744e39a4

  • SHA512

    57a964dc6d1ed64609c259acd76680abc756029cad0a0214f2b930c0c5b0dc4d91c1a247d569343093da1b00c42b362500444f268088db0c6284ebb663ee820f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjc3CB+:1nK6a+qdOOtEvwDpjs+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_34513ccb609bdf021b1929df22c34df0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections