General

  • Target

    2024-04-11_33c814bf2293bf1b84be409353ae0783_cryptolocker

  • Size

    66KB

  • MD5

    33c814bf2293bf1b84be409353ae0783

  • SHA1

    1e64ea4c7a92fd4be6f255fb84cdd5d2d32c5ebf

  • SHA256

    82d2dcbcdf7d05c3d98d0fdb70d34a50626f93ab42fbea083e8adc88afe4d4fb

  • SHA512

    46c6ba3c51191ec1867b9132e185a7b3a33438dad1dcb6daa4edc929e93ff053ef2a469e7978551e2a3873e0c8ef01aeb0c65f43d5efd0e88433807f01239378

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRhV:1nK6a+qdOOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_33c814bf2293bf1b84be409353ae0783_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections