General

  • Target

    2024-04-23_d3c98c4aaaf33f4e4faf0f06fc6fc3e1_cryptolocker

  • Size

    67KB

  • MD5

    d3c98c4aaaf33f4e4faf0f06fc6fc3e1

  • SHA1

    ee2ed4c202873c0dc930f2277674c9b04e800d6a

  • SHA256

    2aa17d3e499bcfe32d0cac2e4c913aa79507ef51f1b3b8b1c7cbe30d4f4b8b45

  • SHA512

    b9bfb4d2e1d65a910855c32b6cab82883aa3ce64a77f5ff3c1bd7bc8adeeaf79e26b2bfceefb69641ff04961895c754c4daf37acf8543e176674b9b6a9a69cb2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UncHU+:1nK6a+qdOOtEvwDpjn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_d3c98c4aaaf33f4e4faf0f06fc6fc3e1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections