General

  • Target

    2024-04-20_dbca3b4baf016ee9e414a9fb087e3418_cryptolocker

  • Size

    76KB

  • MD5

    dbca3b4baf016ee9e414a9fb087e3418

  • SHA1

    7cadfe45523f90ca7067aceff8b8abdaf0ca35b8

  • SHA256

    d20a5f5aa1c17befd36ea4952db8eea9cee371157dd4af1d639a10024ce61d24

  • SHA512

    289dd4429954a38b260d8dbfb53cdae6b6a2734eb7826d606f4aa8d1630de5b23142f97e3f228272066fc174fd6a2460681268eb9d177cd5306b95c125e84ea1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxP:T6a+rdOOtEvwDpjNtHPA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_dbca3b4baf016ee9e414a9fb087e3418_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections