General

  • Target

    2024-04-22_70d2ab7efc1dff7109e8e3f48cc6bbc9_cryptolocker

  • Size

    117KB

  • MD5

    70d2ab7efc1dff7109e8e3f48cc6bbc9

  • SHA1

    354b8cea09d6c51cd70844f5ce7ead218b3d0f05

  • SHA256

    3c2673afc082fe24019a2a2f88f66d90a531b3f74814b33f5ec776b13a9e8df7

  • SHA512

    241a2df23322a0d7846a9f50ccaec9cbaf84e37b466ce31ad58d0d4b94fd3ac06ed87f44b95081b1247c37d39d7fb7021d87d0ba2a25366b862f350d0cebe0a2

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01z:z6a+CdOOtEvwDpjczh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_70d2ab7efc1dff7109e8e3f48cc6bbc9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections