General

  • Target

    2024-03-19_32a621f6d274f11c39ee90b52f43204a_cryptolocker

  • Size

    82KB

  • MD5

    32a621f6d274f11c39ee90b52f43204a

  • SHA1

    092d6378aeb11523e062b547d1e055c1521e213e

  • SHA256

    7b316fbaa6531dcd917c983f6c41f1eaa71cff9a7472b719053c4e5f4e54340d

  • SHA512

    173daf07fa7489a1d244a2e67ac6f3502c4be8743db52d54c68e6eadf9e40fcb706d78aebfd9656ae7167cdd35f18c65abff8581fd72f53e784621f70ce8af7e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1h:zCsanOtEvwDpjr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_32a621f6d274f11c39ee90b52f43204a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections