General

  • Target

    2024-03-12_39815f3b5cdf8ed2dbb1de1fc0ecdd54_cryptolocker

  • Size

    92KB

  • MD5

    39815f3b5cdf8ed2dbb1de1fc0ecdd54

  • SHA1

    e27f3c1cbe1afea5e2bb16f0ffd362cc95374cc3

  • SHA256

    6b0cdc33258495cc0ad46a50bf77ec51f106c6c4ccf190158e611094ba4577d2

  • SHA512

    823f6ad40154bdbbf4f451e17bdea7ae71729b9faee58d3cbeef0c25041ce0358d3a5cb67e4813f4fc61a6937f75200bb8226efdf9271696f9b99771569f3c80

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uvae:zCsanOtEvwDpjk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_39815f3b5cdf8ed2dbb1de1fc0ecdd54_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections