General

  • Target

    2024-03-25_16edf1b3a618e92084f434e3d3a0f369_cryptolocker

  • Size

    82KB

  • MD5

    16edf1b3a618e92084f434e3d3a0f369

  • SHA1

    43a9626839d249ded3ff45e7f48579dec6e49727

  • SHA256

    ea1a1a67f1cbdd8be7246f9db30a0498626e32263dd9a0c02404a4377033298e

  • SHA512

    a8116fab452c8c7a93f871063e9ea89e9979f622989f5020167504c448557c8969eb8511e9b7a709a85b423c8e3bb39ceab316056d422aa7cb3c0b2f49b91c2e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0gg:T6a+rdOOtEvwDpjNtY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-25_16edf1b3a618e92084f434e3d3a0f369_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections