General

  • Target

    2024-04-16_3f5331ff391e77e20d5a0163795ae7c4_cryptolocker

  • Size

    85KB

  • MD5

    3f5331ff391e77e20d5a0163795ae7c4

  • SHA1

    f8d8373f8f486fcb0593d3386ef2a0c277990f83

  • SHA256

    a756a30590bd522afc961bbdcd8bd6e55e85b47f5687a652c6adc248511a06e4

  • SHA512

    9175544e061ff32cfc0d8fad1ede5646c793af4b23c76045c9b1633c59b96b4f49b4efce266112b72ffa7f55c5993a71303d1765ffb818b56b6c111ea4b77ac5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5RO:T6a+rdOOtEvwDpjNP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_3f5331ff391e77e20d5a0163795ae7c4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections