General

  • Target

    2024-03-19_72ba4b040b2d03ed389d3c6436be3d41_cryptolocker

  • Size

    75KB

  • MD5

    72ba4b040b2d03ed389d3c6436be3d41

  • SHA1

    9a0fe8901d39b3c3f12900eb8767911fb097ddbd

  • SHA256

    bbae0ffff51e11fad66594ca8e8fb02e29484b7972cb7a7da45ad972c68e4322

  • SHA512

    c84a5a7ca6b5a414e40d9dff376ba8fd4e3a395b49872a53fe283eeb5ef9bea171d5a22890430ed673ca4983e1ec3a73a7c4185f7a8650d72b2cfeac75cfba84

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRX:T6a+rdOOtEvwDpjNtW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_72ba4b040b2d03ed389d3c6436be3d41_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections