General

  • Target

    2024-03-14_8a69ceae12aac999e2253356c222a0c3_cryptolocker

  • Size

    115KB

  • MD5

    8a69ceae12aac999e2253356c222a0c3

  • SHA1

    fff56f10a5dc53468870b0abf2bc0b6a4b4f45b2

  • SHA256

    96910f0e58b1fc7d79b2320bbf38c1bc4cbe002e3f6275413174f9106fdcd8e3

  • SHA512

    6b95abf841dd6472d745872a199f7abedb6ca59f703d1a384b25c0cdb44219f181c4ed4949cce2387ec5c2d272c62753bba07c8aeae2fd2ba72393eaba4a7032

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar//b:T6a+rdOOtEvwDpjLz2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_8a69ceae12aac999e2253356c222a0c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections