General

  • Target

    2024-04-17_f60f444961e57d785b4a5632e71b01bf_cryptolocker

  • Size

    95KB

  • MD5

    f60f444961e57d785b4a5632e71b01bf

  • SHA1

    64b0d50478be6c0adba49c9deccde0f669ec68cf

  • SHA256

    4a1a57aa0e33653c0c61237f3f37a7f890b1a2916d2400037b74deba91ebd637

  • SHA512

    3a2c2b46e5569bc98a791a7dd8bb6d0a4005dedb53ae6d3245d93e7936dfa738873e5440124a0d3a61af2f4881c006901f7d41e6015acbbf42591dbd6cce195b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bh:zCsanOtEvwDpjBV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_f60f444961e57d785b4a5632e71b01bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections