General

  • Target

    2024-04-16_93c97c3a369a7d3390aefa2bec387233_cryptolocker

  • Size

    85KB

  • MD5

    93c97c3a369a7d3390aefa2bec387233

  • SHA1

    ca9a195a7f4a751182111c0bc45d0149a2bbfb6f

  • SHA256

    66d2b74c784402936f6db57eb6f2b95faec4d70462619e8c56ad0301e3bf1399

  • SHA512

    edf9f0a67578f1cb0745510e3969e8d4fea445b548c63a099385f1a4a6e25641b9ce4bea625d7a367699db80aadcdd2d2236fccaaea11eb3463ca82823665560

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R5:T6a+rdOOtEvwDpjN0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_93c97c3a369a7d3390aefa2bec387233_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections