General

  • Target

    2024-04-20_4f3b7538ec01ed1f1be7fbfc7ab9b4c2_cryptolocker

  • Size

    85KB

  • MD5

    4f3b7538ec01ed1f1be7fbfc7ab9b4c2

  • SHA1

    d959768df457e83d39b9cf395c44a20c84c0c50b

  • SHA256

    7aae6dd784bfda2d2ea9f13e473c6af913a1fa952f0f0722b019d2ef4a4673cb

  • SHA512

    2c20ef4bfc308c1d8094d55f1c00d1c0e9ce86b889a0fd647f44bd207b835dc4fa13961ff30b61e3da0fbb59656e1c6b9981d5ef673ced8ee51e75fe993b67f2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rn:T6a+rdOOtEvwDpjNW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_4f3b7538ec01ed1f1be7fbfc7ab9b4c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections