General

  • Target

    2024-04-20_963d79d380a1272c29e1d6da71072079_cryptolocker

  • Size

    59KB

  • MD5

    963d79d380a1272c29e1d6da71072079

  • SHA1

    3bcb13f0b5264ff8d900a004cd69403123aced03

  • SHA256

    ca067eda34f28359738e47c044291beaaf3cd6ccfe777fd1fa527e97ed69c10e

  • SHA512

    5ed8a1df3ae691e5d17f1ce173b4466a0b642c43b1df47325e791c4f4cc20c12f593b0f3460ca90096c9eb8823844d748f8f330707786a8e0248293f9a61fa78

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5app1J7Jy:z6QFElP6n+gKmddpMOtEvwDpj9aYaz74

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_963d79d380a1272c29e1d6da71072079_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections