General

  • Target

    2024-03-14_0cf11ecf6cb43f9b736792f3f8cf85f8_cryptolocker

  • Size

    63KB

  • MD5

    0cf11ecf6cb43f9b736792f3f8cf85f8

  • SHA1

    33ddac25407e57b7556f316f03775fafcf7a09f0

  • SHA256

    53e59c4cd883463251adfd1c5730594e74fd3baa1460cf2a410986fae7f1edc3

  • SHA512

    a52fe317bc777c356b4c063c40b4908ec5883a7c21718da4a3c6b315bb71a4da9c80f400ce96ed1956f4fdb328c6d8f439233e624785126fc9216dd9a49ea03e

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo7+:1nK6a+qdOOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_0cf11ecf6cb43f9b736792f3f8cf85f8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections