General

  • Target

    2024-04-04_8988e75a58454d9d6e00aef93c4c53d7_cryptolocker

  • Size

    75KB

  • MD5

    8988e75a58454d9d6e00aef93c4c53d7

  • SHA1

    72f7e4215764988838892ccf00b154521d96f2fc

  • SHA256

    846ea2c8a36711469748e9ba26d92a30cea0508c520e5fa823107cfc3a52bc90

  • SHA512

    c9edc5d11900eb5c6d7b76d0675d76b395772b706772ef6bc3712f917ebc6acbb0a3ae36e2ccbb087c779e6670c493e3ecfe7315c40b251a2ea96c940ae638af

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx9:T6a+rdOOtEvwDpjNtHPu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-04_8988e75a58454d9d6e00aef93c4c53d7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections