General

  • Target

    2024-04-10_a20c308e210c3bece8dddb30b3811872_cryptolocker

  • Size

    84KB

  • MD5

    a20c308e210c3bece8dddb30b3811872

  • SHA1

    fbd90a0ffb12c2e9afe0e4c0dc77ceb4b41a0a77

  • SHA256

    595f4ff757c0080ab26453c20f0b420062a826e03baf709ffd7a16057c344489

  • SHA512

    5f4c34ec905d09eba0e72c29d2fa607606fe316568efb2648c77859c5af81519082ae373602d82718b3c8f9f45f78521ef7b4b133f09fcc9c0c7cd5de8e65e7f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5RH:T6a+rdOOtEvwDpjNe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_a20c308e210c3bece8dddb30b3811872_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections