General

  • Target

    2024-04-16_8a2acbfc8012c399c8d281edd4d8e82e_cryptolocker

  • Size

    82KB

  • MD5

    8a2acbfc8012c399c8d281edd4d8e82e

  • SHA1

    73fda6a34315eeecb568cd743269b14a795ec6e1

  • SHA256

    fee9ae8cd2de8fa1d8093ffe4bd2758a0646cedeac3ed818b39837cfe0c28a2f

  • SHA512

    039ca844e721e70616d062c5c21d19b5650a567c83a93a47f0fa3e93ffe141ce70034804c9fcd602efbd0277878c8e808f023e6b4ee4a6fa27e15df27a895231

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0E:T6a+rdOOtEvwDpjNtL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_8a2acbfc8012c399c8d281edd4d8e82e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections