General

  • Target

    2024-04-04_1fa339c9f9bec06e65fa44980506d9f2_cryptolocker

  • Size

    93KB

  • MD5

    1fa339c9f9bec06e65fa44980506d9f2

  • SHA1

    a08386385fc60f7385a51316f5d3a668b47c82e6

  • SHA256

    331cd446cf6ed63066d9e391d9227b36319109282a8e8cb150d32adb962c5cc8

  • SHA512

    cb6cf7f4ed6e067efa5ef14d20013862bf3256129605535a8138411fc5caeabd5ce5d176d34e0e6c00db3ccf70cfa3bfb8f5f077f6ba007804329ab32ba7bdfc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/z:zCsanOtEvwDpjBz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-04_1fa339c9f9bec06e65fa44980506d9f2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections