General

  • Target

    2024-03-13_4a7f1a309fa57ad6d14cca05c86d704c_cryptolocker

  • Size

    57KB

  • MD5

    4a7f1a309fa57ad6d14cca05c86d704c

  • SHA1

    7d6020c700fde26c334384015ad4dc0b05584780

  • SHA256

    c317f5bf5970439796f36ed1deda9d393e5841bcc3f3b9c72d89b88545d3c846

  • SHA512

    9df31b459127b3a92cd7c05dddb4c794501257017b039cc9cafefad8e903cce6f48bf9b5fbbdd26c4c93c406f7edb60dd07c2f1cb9729afebc2febd0fa3e3885

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax8ikflF:z6QFElP6n+gKmddpMOtEvwDpj9aYaitF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_4a7f1a309fa57ad6d14cca05c86d704c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections