General

  • Target

    2024-04-06_38f6ebb2f615c22f77fe1f2ea54a9971_cryptolocker

  • Size

    88KB

  • MD5

    38f6ebb2f615c22f77fe1f2ea54a9971

  • SHA1

    b2814ee0c9a8ac4ede788cedd3aa23efcf7e2296

  • SHA256

    fd6c5f233d9fbb8b17ea5e6d12e6342283e6e9531f7239475683f5d52e1f3205

  • SHA512

    4dd7bc28c9acb1b1590ec4b43560f5a00fffbab4ada6fe87944fea9f65655b945c6ca732a62c92625e1e6da7374ea55192d9b5d3c997a857782e9d79786b2fbd

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjRH:zCsanOtEvwDpjE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_38f6ebb2f615c22f77fe1f2ea54a9971_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections