General

  • Target

    2024-04-05_0960758e124cfc5d830e7ddb510235bf_cryptolocker

  • Size

    65KB

  • MD5

    0960758e124cfc5d830e7ddb510235bf

  • SHA1

    38af199f2cf159b2e5c405c77e4ed800c15e654d

  • SHA256

    cbfa34eabfaaa435950c6241d6817ab8cb95088df3f28a282c7ffca7c8676dea

  • SHA512

    65236798177ef814539177593c26958e0df4dc5c045a1be551cb7f8ae53cd67e204d9d624f6f90dabc4bb452d59dd0b7f6c8256d9156c1927cc6c4842154fd10

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQR4:1nK6a+qdOOtEvwDpjt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_0960758e124cfc5d830e7ddb510235bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections