General

  • Target

    2024-03-15_4c489c33323eecebacff8a5be68004c3_cryptolocker

  • Size

    78KB

  • MD5

    4c489c33323eecebacff8a5be68004c3

  • SHA1

    fce445473695a70c2310d4dbe5a4d620228d878c

  • SHA256

    04bd2a4eb2adbb8afdaee5112b8f15dedce2b6442a2674d8790b4e88b94fc458

  • SHA512

    52a151f132562853be9d583c1850636c5edb864089df6dee37dba84f8f65b67c1426a50d0e920c60dbd4b835c3d8812d754c22ba401cac0f2dfe1ef7c21604b4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyyM:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_4c489c33323eecebacff8a5be68004c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections