General

  • Target

    2024-03-13_c4e078078fadc39c1c4bd727ca5b0ab6_cryptolocker

  • Size

    116KB

  • MD5

    c4e078078fadc39c1c4bd727ca5b0ab6

  • SHA1

    e4a3ca913d0d44da75263abab06cc8dc2c7a7e1d

  • SHA256

    a82a4a3c6067306536a44c4c882fe96cdb436cf9aad03dcd05a774998b6c3657

  • SHA512

    d00390250369b101444f0fa2b57b27e140f9d548f2d1d8886cdd3f4add615b50cdd48246d56a488d54073b3148033de2e69e4694129f9e2291c60cc17055686c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/W:T6a+rdOOtEvwDpjLz7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_c4e078078fadc39c1c4bd727ca5b0ab6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections