General

  • Target

    2024-04-09_f0e579b1b5a1fbad58515a537b717584_cryptolocker

  • Size

    83KB

  • MD5

    f0e579b1b5a1fbad58515a537b717584

  • SHA1

    0b44ae5a5df92b9d6279447df8fb0f285e4bea50

  • SHA256

    76f128013da7a9139bc13332eeb0afdf37529a61790e09378e52c95122a99a88

  • SHA512

    e4fdac3ab909cd9cd871fbf88cc819c877350856026760345bdc42f607f38dff4686e28cbfd0fb6d7bd232640ba1a3b49a4d01b4ee08e5d86d51969867ac7d04

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7h:T6a+rdOOtEvwDpjNt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_f0e579b1b5a1fbad58515a537b717584_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections