General

  • Target

    2024-03-27_4c845c8b812233154c7d36857b23f19c_cryptolocker

  • Size

    94KB

  • MD5

    4c845c8b812233154c7d36857b23f19c

  • SHA1

    7784b3f2713e162607f85cca619b744b5b3e8c8f

  • SHA256

    4750c3653c7667cb4bca80551648a41a916f861c737e5424f03e7a063813d66d

  • SHA512

    812f7f9d621e7784719fd4b7097bfbae9856f44eb3346e0226c85560dbca46de10b0a17f840c97fad2a2d527b6f01ff502341d159706e5312f630f1e1348ceda

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bL:zCsanOtEvwDpjBP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-27_4c845c8b812233154c7d36857b23f19c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections