General

  • Target

    2024-03-11_470480a1e348f8f096eb7774e0cf685d_cryptolocker

  • Size

    72KB

  • MD5

    470480a1e348f8f096eb7774e0cf685d

  • SHA1

    f3bce990084d11244bc9ce1cb41e85d2139ffb9b

  • SHA256

    ecc8b1aca30271f0aaa58b35fffeaab700100bbdacb07d73bb7eb5e0eb6af0f7

  • SHA512

    e7bdbbd45e6de6921f5e01fd6f6e0d48e5750ef2b9c0f6fcf75a8d888ea1e4e3b4c59d37b712fd0b39dfd7dc9a7304b1a2d2355604ea4d1b511d4d622079fd6d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFA:1nK6a+qdOOtEvwDpjy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_470480a1e348f8f096eb7774e0cf685d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections