General

  • Target

    2024-04-11_13b3a87511b6f81395be2df29d8b071f_cryptolocker

  • Size

    59KB

  • MD5

    13b3a87511b6f81395be2df29d8b071f

  • SHA1

    f858f3ac66c311bd86aebd286c0c48aaf5b508e9

  • SHA256

    a3bdc64107a8eaca7404a449fcf727a2e4db60db2a106c234251fecdfeb113eb

  • SHA512

    37fd2858e375cd7ff8ef7ea4391145f9d2beb986091d0ba26db39e7b0b8ace1515c9087e85b7ecdd37abc732eae44062b3d4c78179d27e770c9fe26b8bcc8734

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpysnymS:zj+soPSMOtEvwDpj4yRymS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_13b3a87511b6f81395be2df29d8b071f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections