General

  • Target

    2024-04-11_bd3fc34bb1145628f60f0c87124c2839_cryptolocker

  • Size

    98KB

  • MD5

    bd3fc34bb1145628f60f0c87124c2839

  • SHA1

    14c66e6c7386cab700b11330d6602b70918b61f9

  • SHA256

    6ee98e1b09f475476f13d638865ef39a86753098ba3abe05f83735350591252d

  • SHA512

    40d80a654a5424ced6fbd6662b1c8ad9c6f67cde78569feeaa45e09ae2584c8f7e8d72332d480b586a1b606542aea9219bd1f3fb73bb38855bacaf81ee06618b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXU:z6a+CdOOtEvwDpjcg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_bd3fc34bb1145628f60f0c87124c2839_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections