General

  • Target

    2024-04-03_330fee7f685c92178f5301f458824738_cryptolocker

  • Size

    107KB

  • MD5

    330fee7f685c92178f5301f458824738

  • SHA1

    901ba4cdc95f4c57450f385ea20c4ec7f29718ca

  • SHA256

    edce48dd9b1dd2a0d2d4d2ce656cd9f0d8768e2fc119381f1e71706c9bc7efdc

  • SHA512

    3d709747e6dcb21e2f93c6fbc0f4053e2ef50085374a2b2dd605e8904a8293ee2cbed439be18da4ecf613ac081187e9ace994fdb8b50e7cc58cd04fece0c5021

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszf8q:1nK6a+qdOOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-03_330fee7f685c92178f5301f458824738_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections