General

  • Target

    2024-04-20_f0392a6c8a7ad286592f6ea9be26be17_cryptolocker

  • Size

    84KB

  • MD5

    f0392a6c8a7ad286592f6ea9be26be17

  • SHA1

    988c1d82efb7ae3615fa6565824baa4dcda2fc1e

  • SHA256

    11cb2cdb66d7426c2bcc2414e3ffeba53dad5bf983fa42b922612601eabba919

  • SHA512

    21bed575e15185883c5eed2240a36819dac3a36d0bb585206ff9d807ed5594284fd6280bf6da0d60f61969fe6f8273c3dabff30ed5d5375054b9c10f62c83126

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rs:T6a+rdOOtEvwDpjNp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_f0392a6c8a7ad286592f6ea9be26be17_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections