General

  • Target

    2024-03-13_0f3c687fb1105eaec14212e8a6517ae6_cryptolocker

  • Size

    83KB

  • MD5

    0f3c687fb1105eaec14212e8a6517ae6

  • SHA1

    e57ef1273fb8791569fc93aca141f30f9c49ccb1

  • SHA256

    6320a68bde8793d2a7f11a6f0fe7939aeb5eb69ad7e83f259a46aa21f0965c99

  • SHA512

    cacc856178a78add6e15714f53d83a250eed9f7bb8640b0ae841d1ed6d7509962bde19cf5a70931634ed67fe0bb52f30dc89d3ce4379cd4da2c10c8ab4bea41a

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vV:T6a+rdOOtEvwDpjNx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_0f3c687fb1105eaec14212e8a6517ae6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections