General

  • Target

    2024-04-10_ad65cdfc0fba4c2248e9c53bb8016e3e_cryptolocker

  • Size

    81KB

  • MD5

    ad65cdfc0fba4c2248e9c53bb8016e3e

  • SHA1

    6a40e8b0d6bf7e306da7b5a36a07c50c236db8fb

  • SHA256

    819f58d68868b1ddff0d4190365fa457874b7481c59510a6685fdcfb1ffede52

  • SHA512

    f7573daba67d5ead8933950c30d968f7c06256e1df7f4c94495c7bf566db7ec19388d93bbe5c6baf93b737874b35515034bd3459337d5e30eccb4bf8bdd29e97

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qp2CEE:zCsanOtEvwDpjv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_ad65cdfc0fba4c2248e9c53bb8016e3e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections