General

  • Target

    2024-03-12_b3fc79c53773183a37963bc740411d16_cryptolocker

  • Size

    81KB

  • MD5

    b3fc79c53773183a37963bc740411d16

  • SHA1

    22fcefcee1ccf3a55ab3e3786f212ffcc58a3197

  • SHA256

    8e5dc8a16108075f88da2b44326e3e6ec52d8fc04b6e4bbf3649b2e6698e3c49

  • SHA512

    96379e2453adc931370903d8d8cff6ea1ed8c7b44984502663378ac089585c37334fc55d06cdafb600aa155adb72ea0487eabc08ee86188de8509c2c6c33b7f2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd05:T6a+rdOOtEvwDpjNtC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_b3fc79c53773183a37963bc740411d16_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections