General

  • Target

    2024-03-13_f3de635ad32fa0c1062717c79fe7f273_cryptolocker

  • Size

    115KB

  • MD5

    f3de635ad32fa0c1062717c79fe7f273

  • SHA1

    4508dd5f0262d107a0b0833b2ef592506ab0328e

  • SHA256

    7a743e0febf48dea1a46216c3ac7b04bb8ab375ce2ed70883dbb423fe79e83e9

  • SHA512

    6f4a982e1cc82f707d4a5a12ae81bc43e255621575602a86b865c198166806dfb25db91019eaf23b016a9ba8dc6fa2a7a46b3e71e57e9af91b0c75a170653895

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp0QVOo:z6a+CdOOtEvwDpjczU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_f3de635ad32fa0c1062717c79fe7f273_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections