General

  • Target

    2024-04-18_f32f15b86653028766dd6e77e555c648_cryptolocker

  • Size

    64KB

  • MD5

    f32f15b86653028766dd6e77e555c648

  • SHA1

    1b8a1392d8e5de80230fb59ba84042620951683d

  • SHA256

    cef51c0e50aa7b225e9df79582e44a20a8d2e97e981a50d8a20bfdda9db73707

  • SHA512

    70d3869f376a50935b281a6c9d9c543fd6e2e89d866d372d6306f5dc9814b29ff06949d3245a54d363362aa668c3e25829c4dd5f158a9c7d405263896245595f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8x7:1nK6a+qdOOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_f32f15b86653028766dd6e77e555c648_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections