General

  • Target

    2024-03-16_4ec398301b9d177e5fb8e3a6ace5844f_cryptolocker

  • Size

    106KB

  • MD5

    4ec398301b9d177e5fb8e3a6ace5844f

  • SHA1

    d22271dae44a20224d9107b2706e0063499bc82a

  • SHA256

    e9c58fdccbfa96e8676db6d2e869d0f5b516ef7d843baa5f738dd71698772128

  • SHA512

    522b67172dcfcf20047bb45f4efb454474a4bb8a9383f441880f94d36072f6613f4ad4769b1808151700edad530fd82a4525b9a3a2ad8854d201143d4a26d645

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksas:1nK6a+qdOOtEvwDpjt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-16_4ec398301b9d177e5fb8e3a6ace5844f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections