General

  • Target

    2024-04-06_a7e3f8a35873a1d231362489e7f2d44a_cryptolocker

  • Size

    119KB

  • MD5

    a7e3f8a35873a1d231362489e7f2d44a

  • SHA1

    94fcc92b1268ef03297a0c9463d8fb37216529f4

  • SHA256

    b2c71cd733b7493620834237f6c3d9a4571255bacbc8f2d4881a32709744b58a

  • SHA512

    179f6157f1f1a33f4cc2d8a2776b80cde28657168e83b188e6279383c2dc70a4969fa48f8716f2260fd07be5788637890da7b66247df8166a38b5f4879a7f3a1

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01rBEK62:z6a+CdOOtEvwDpjczT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_a7e3f8a35873a1d231362489e7f2d44a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections