General

  • Target

    2024-03-11_4ada1b38bc2dcc6c88af9ae087e82b7c_cryptolocker

  • Size

    61KB

  • MD5

    4ada1b38bc2dcc6c88af9ae087e82b7c

  • SHA1

    a595c72e391b82754906c197a3f0cac43ab29b50

  • SHA256

    53e57001370bbf8903ac2491f3d18fbac347ab535d2777dc63852863201493a6

  • SHA512

    342810d5eef7e9be24031aa026a8b2c5f03ff8a005a01e1dcd9d9f31f04b6c91168a1edd135c737be11f293b33307d6deb9155a8fcf2935d4b0660632e63745f

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J59A:T6QFElP6n+gxmddpMOtEvwDpjwa39A

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_4ada1b38bc2dcc6c88af9ae087e82b7c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections