General

  • Target

    2024-04-16_15823e5a169d1c45afd9df4a9fb4fefb_cryptolocker

  • Size

    77KB

  • MD5

    15823e5a169d1c45afd9df4a9fb4fefb

  • SHA1

    fba6b61b3aa777de714f8d89ac5b5ea0c1bf017f

  • SHA256

    b40357d28da1beeeef6bf4123dcac2a6065f9e4d4a621386fd27a0922063de08

  • SHA512

    49b34cb322973a152fc764a03bfd89b2c4183243dbadc69b2093d92f964288058eece8f77defced9bbc5151ea74701e64e7567d161f8821f541aab4fd3d6050e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRQ:T6a+rdOOtEvwDpjNtN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_15823e5a169d1c45afd9df4a9fb4fefb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections