General

  • Target

    2024-04-05_3e8f37be236da6c5ed264744fb3417d9_cryptolocker

  • Size

    50KB

  • MD5

    3e8f37be236da6c5ed264744fb3417d9

  • SHA1

    66eccd5223f84f883f1d6f80d8be76218de4a364

  • SHA256

    ab664888616068da52b924f379029c4f75c1cd04fff995e1fc6cd79207c9693d

  • SHA512

    aef0dfcc5f29c0ef2103a7e2be889f948f030f380d815bfe17eb48fffeabfb61c4557491c2a4615e90d6fba9da3e149dfae3ce3e464f7ae3e370ae4bc87c1941

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTy:z6QFElP6n+gKmddpMOtEvwDpj31O

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_3e8f37be236da6c5ed264744fb3417d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections