General

  • Target

    2024-04-10_bf73b4a2912e56c9c94fd3173eceb9d9_cryptolocker

  • Size

    84KB

  • MD5

    bf73b4a2912e56c9c94fd3173eceb9d9

  • SHA1

    dcc3f57c08bcb9271347d3d8ad24d69252415661

  • SHA256

    0f8a53f66f8683f79f70f1ea23b1967d62b1cc90de9c51da46ac41a3faaf6b36

  • SHA512

    624884d38c5c4d329ee8e540ed076a36d68e010890f97519e1ae3df8c72d5ef0c4ef94be840a4e6912060e25f1cdc44a3a1bd6fe44b08b5de4c8ea89778ae56e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rk:T6a+rdOOtEvwDpjNZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_bf73b4a2912e56c9c94fd3173eceb9d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections