General

  • Target

    2024-04-06_1520c900b33db8d465473cd7987572fc_cryptolocker

  • Size

    84KB

  • MD5

    1520c900b33db8d465473cd7987572fc

  • SHA1

    35b4215ae0818255aef933eaeb8da1a600d6ce8a

  • SHA256

    d4d995fb05293136fda6197662ef3d44de9f6246255bb37c833841b35fd7f967

  • SHA512

    77b5ad28582977881cecda4a0072c1a0e1af17ca66ac873ff59158796d39f93c9f59f75d26b82087e54cd55f75397c13d3f573495f2c06b4ed6a86bd712ec0a6

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5/:T6a+rdOOtEvwDpjNs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_1520c900b33db8d465473cd7987572fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections