General

  • Target

    2024-04-04_c3562db1825f33156f432e0b12610359_cryptolocker

  • Size

    75KB

  • MD5

    c3562db1825f33156f432e0b12610359

  • SHA1

    1973496a199359fe5452f71a96e45cb78a19dcf1

  • SHA256

    fea2b6791d5d22e513e4eae41925772955fdb6db46fb3973f147eb54b7b70f5a

  • SHA512

    0aa7e5bf70eb092a14fc2664602842abf548d0a5e8db4af3b43203ec5777bf76648d07ba18ccf2bd3d655275ddca04b1917f90bbc84a4350b7a85cac59dc1a69

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4:T6a+rdOOtEvwDpjNtHPP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-04_c3562db1825f33156f432e0b12610359_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections