General

  • Target

    2024-03-14_a6b4b9df7f96379b4a50f1626e6d46b1_cryptolocker

  • Size

    117KB

  • MD5

    a6b4b9df7f96379b4a50f1626e6d46b1

  • SHA1

    2696974daa54c59a4507134aedc2f6ff7b3ea54e

  • SHA256

    14436f2537fc35a077a125046e7c6e486c1c786b63a36642254a870cf50f5979

  • SHA512

    3552c047363b7d285d77199e9aadec78c9fd3e5018a58e0ab5e0fac684f1ee8c7f8c3d4caed3c6496229ea74ec455ad63c9dadf8ba36ac07d3db75012d4fadd9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX93:T6a+rdOOtEvwDpjLzr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_a6b4b9df7f96379b4a50f1626e6d46b1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections