General

  • Target

    2024-04-17_354a0a8669f3f13a92ec59936f49fdd9_cryptolocker

  • Size

    74KB

  • MD5

    354a0a8669f3f13a92ec59936f49fdd9

  • SHA1

    09f9b64a7fab6f4962e45844be3dcadd2a658785

  • SHA256

    2d0b667c5563e0e1d56b0e005a8e8cfb83046d356b90ac53c62bb9f20fbfee85

  • SHA512

    f2c3608ca80157bd438a2216edfbf6cc14d81da4848e7eb4c7eaea32ed82a8c86492397660dcc9793f965d4417a426267b6326978a2917393ed4635ff2214b44

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVru:1nK6a+qdOOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_354a0a8669f3f13a92ec59936f49fdd9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections