General

  • Target

    2024-03-28_439ef153840e63c61f4c199992764cfd_cryptolocker

  • Size

    56KB

  • MD5

    439ef153840e63c61f4c199992764cfd

  • SHA1

    a9c71311fa047345aba68f1574e165d29bd5ba33

  • SHA256

    3b2313bcf8010a2677b104cf446269cccf39be96fe56a3a4e5ecdb8d4febe110

  • SHA512

    815364e09a378c088d4007cec15c1594d95e49190b7b811e14f83f7109695a70e6cad33f94e0c5c43d842a4b942a5f0ccaaa065c83d0bf7e30217ef0444c2f5b

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axpkm:z6QFElP6n+gKmddpMOtEvwDpj9aYacm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_439ef153840e63c61f4c199992764cfd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections