General

  • Target

    2024-04-08_7cafb9e5a3d3e863f6cbcf1b460b6b62_cryptolocker

  • Size

    147KB

  • MD5

    7cafb9e5a3d3e863f6cbcf1b460b6b62

  • SHA1

    575fac85ec0fd8cf7147ae502771663237789c8d

  • SHA256

    fa1b390bb0b5313d4baf9ea3b9ed2f67d8eb8600ba3c856bb43a9c48359a74dc

  • SHA512

    4bc7af886518d64212d17045dd005ac889d2309ba3cb385dbb26bf7b81ca9ba7d0218486b9787af931c4c5935412f9176e45a83c1e09001fc22987ba7460bff6

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eH:z6a+CdOOtEvwDpjcz9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_7cafb9e5a3d3e863f6cbcf1b460b6b62_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections