General

  • Target

    2024-04-22_f73d1e5040b268b099812317b7ab99a3_cryptolocker

  • Size

    79KB

  • MD5

    f73d1e5040b268b099812317b7ab99a3

  • SHA1

    7a4fe71feb606352bf309d73b43a7517b6f1f596

  • SHA256

    2fcb16d44e372e5237d1f1f3f694a1933a1c35051702f665b9bcf087f1c17107

  • SHA512

    16f9304d36d8258ea7b0e1f1cdcbe01574c8af927bc9c9b1e84e288ee83c18bcf18b44144f7031c6509b0c81c93148130a7cdba493a0ac0161e194c98c71217c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqH:T6a+rdOOtEvwDpjNcc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_f73d1e5040b268b099812317b7ab99a3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections