General

  • Target

    2024-04-17_a7a3ab0edf81fb5cb1c2e1c338624580_cryptolocker

  • Size

    51KB

  • MD5

    a7a3ab0edf81fb5cb1c2e1c338624580

  • SHA1

    bc79d9f7726fafcff8f60582534489f5049b4472

  • SHA256

    34b2db7e4692383c40882bb8dbb2c7cca77b6d990bd46f087256a2fdbb30eda0

  • SHA512

    0ee155918776f1b768de90531e6edfd9bb762b8d374329d66b10ce0cd98cf984e8389118b8cd94785b65ba770e4d0ccf892af5705d3e7837ab8d00cbe0e872dd

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTO9:z6QFElP6n+gKmddpMOtEvwDpj31i9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_a7a3ab0edf81fb5cb1c2e1c338624580_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections