General

  • Target

    2024-04-19_f0dfc7d571e9669f727870cca4a55b55_cryptolocker

  • Size

    76KB

  • MD5

    f0dfc7d571e9669f727870cca4a55b55

  • SHA1

    4f22f1afb21e39d9063be52c3f65405edcb07908

  • SHA256

    72facebcbf2904430891dab265374804d1e62cdb790d02d80934587cd8c3c06b

  • SHA512

    a75090394d8ae49728fb625724f3ac5d208b21b19e3e3690a0e7eae4c40e1ca61aebb2089c3719ef54ddd16d119b4a0b3687b7c1979a9d02f9172c45db513030

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxc:T6a+rdOOtEvwDpjNtHPT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_f0dfc7d571e9669f727870cca4a55b55_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections