General

  • Target

    2024-04-22_41a34508ff6c9dcd34c1c71b8ca1ee3e_cryptolocker

  • Size

    78KB

  • MD5

    41a34508ff6c9dcd34c1c71b8ca1ee3e

  • SHA1

    ffa01bf7d3d8589ac3eec1ce1c1da905a26c61d3

  • SHA256

    f035025c213b0f59c4894e16ef58acc46df92af0a3e9db67e762d2062d043a79

  • SHA512

    b3ab53473dce4c673b9a51917e0c442f53d24acf545eb58ba581c29584a0b71cb21a978c088d239f5bdb4c8872993fdcdc6d3bfd880026c9998db85c9712d89c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqz:T6a+rdOOtEvwDpjNcY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_41a34508ff6c9dcd34c1c71b8ca1ee3e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections