General

  • Target

    2024-03-13_49e84d6bbe341bc17a7fbabeabc36f34_cryptolocker

  • Size

    83KB

  • MD5

    49e84d6bbe341bc17a7fbabeabc36f34

  • SHA1

    865547541191f967e089fc1c3cebda4d5cadd349

  • SHA256

    0b714946d9f8d539337c0232073782518b081ace210ca90fdb40fb903849af29

  • SHA512

    16362f0644db8747a31e3701040016626d1b9243d75a053bbe2fc1234ee1d62215f3a124aa4350d2f4493edafa2328596e753fd23a0cecd466a7dc9d31f92309

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7va:T6a+rdOOtEvwDpjNm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_49e84d6bbe341bc17a7fbabeabc36f34_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections