General

  • Target

    2024-03-29_4fbf81719b40a5f400cb5d17c9f543b7_cryptolocker

  • Size

    61KB

  • MD5

    4fbf81719b40a5f400cb5d17c9f543b7

  • SHA1

    7ea7722c7b1b0fe8cc4f4c1c65363151e7773862

  • SHA256

    77ede82dd554fc6a8d5e1763eb68dcc385e2342f00f9294a8d5fabc61d0f1ce6

  • SHA512

    75b52cd3d92a742cc8eedf7a98fcf38b67fe3eb5d0cfe40d3b39399ceca224cdf57b385a1ca7fc0230a000e2a314da54ee8883a99c1ee5077424ddbb736f56fe

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J59K:T6QFElP6n+gxmddpMOtEvwDpjwa39K

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-29_4fbf81719b40a5f400cb5d17c9f543b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections