General

  • Target

    2024-03-13_3ad954f64abf34527aa04c41773d6e9f_cryptolocker

  • Size

    81KB

  • MD5

    3ad954f64abf34527aa04c41773d6e9f

  • SHA1

    33e1f34e62bcab742654383781eceab237e3fc00

  • SHA256

    3fed314aa41f9cf88589919514726b1c0f4191bed647e296a9ae7df3117973e5

  • SHA512

    a2f6776b3add9eef136e96b849d1a532788a837f8033017742da061e0e26dff40dff34fab28938d0661e258def7f8dc32f373ea62df1593147659f94eff31d5b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0P:T6a+rdOOtEvwDpjNto

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_3ad954f64abf34527aa04c41773d6e9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections