General

  • Target

    2024-04-08_d7cfb8c4ff23a5872019087d0f1f5685_cryptolocker

  • Size

    99KB

  • MD5

    d7cfb8c4ff23a5872019087d0f1f5685

  • SHA1

    161fad0212898f2a8806b0d9aa7f3cc6ac85a491

  • SHA256

    71d119693d34b95f934e2929a13d77420bb9f17d3fccdb484928aae1055df54c

  • SHA512

    dbe03068b7fc4131aed9811e4384b1d2ce456d48726b137960bb80b2313f860806259f1dc39df1a70c9a3c6c360a62e30309ba76bd87dfb50ae1f81c667b6023

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQpd6:zCsanOtEvwDpjV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_d7cfb8c4ff23a5872019087d0f1f5685_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections