General

  • Target

    2024-04-06_35b0059e4b6ee839974137480042fa81_cryptolocker

  • Size

    57KB

  • MD5

    35b0059e4b6ee839974137480042fa81

  • SHA1

    12a728a925ca6264849307675da0e13b66e77ba9

  • SHA256

    46ccae9607a069274fbfac507df5a61b6801a98e969bd4dc374c47ce4ff960cf

  • SHA512

    917a3aca0b681d860343c19b7c81602ba48918c23032373ac5f672fc21448676b7a2272db63d7b066388685a84c278038a55f5e8183f9d0b47c7d462c5cf9801

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axT4:z6QFElP6n+gKmddpMOtEvwDpj9aYaV4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_35b0059e4b6ee839974137480042fa81_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections