General

  • Target

    2024-03-14_539671d8207b3a85d5500eb9f64cd807_cryptolocker

  • Size

    99KB

  • MD5

    539671d8207b3a85d5500eb9f64cd807

  • SHA1

    6a98acc254929baee51617e0cde47d98fd82c68d

  • SHA256

    af69d1c555d23eb53761d8e3c78ec2cca84ae3345aa439384d46ee47e2265a6b

  • SHA512

    20297c6b13c38667f833eafe23b96adabbe733fc2464fb0dd1ba1f383d62ac029ed48d8509e0212b0dffec3ce7fe7d09ff19b48d493a63eb0d2763772c617399

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXa6cLQ:z6a+CdOOtEvwDpjcV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_539671d8207b3a85d5500eb9f64cd807_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections