General

  • Target

    2024-03-16_43a335e67a1aa2ad2f134f4f0690d3f6_cryptolocker

  • Size

    106KB

  • MD5

    43a335e67a1aa2ad2f134f4f0690d3f6

  • SHA1

    df0ca79ae3138fec8ae9cad3b033ad775199f7ea

  • SHA256

    7b980ab33c67dadb12a72e705735eb645c7f573d9a20d1fa3a601dcdcde0fd1e

  • SHA512

    2cb7209cdfe010b40db8f1afb12558d30ed46277e41cbe727406f36328298eefa55a47a0b1aed37bbed0c577baa9081b9b64b7f2326fb227e135b306907dda0c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksa3:1nK6a+qdOOtEvwDpji

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-16_43a335e67a1aa2ad2f134f4f0690d3f6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections