General

  • Target

    2024-04-09_31b8b1144a40064e8d42c57c013ba501_cryptolocker

  • Size

    66KB

  • MD5

    31b8b1144a40064e8d42c57c013ba501

  • SHA1

    8ea2b3d97bcb357971172c18d751ab40851babb6

  • SHA256

    8a47f9a792be0911dc43737119c57d5f35509c7107ab5413ae214d9a4521b744

  • SHA512

    dc28bb72e9210b1f9e5b811666bb254a9c066de4b9bc0207253f181416ceeafdef75f52eae8a98a0f5bc0f89fc3431a0b8cd1431fc9a515347e137f886dbbcb8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRhU:1nK6a+qdOOtEvwDpjf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_31b8b1144a40064e8d42c57c013ba501_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections