General

  • Target

    2024-04-29_83e0abd2397be3b49ca959ef69b2f4e0_cryptolocker

  • Size

    77KB

  • MD5

    83e0abd2397be3b49ca959ef69b2f4e0

  • SHA1

    0804bd389394ba27ae7bc52b34497193b3a62e3b

  • SHA256

    3b4d23888a65c1bd8f9ec627457292c041fb0f3ef30242b418e622b734fe8441

  • SHA512

    7b185548e095885a06f18cbb80daf6f04f6f4f0b2b7dd5a16f0609f7b3d375c49038eba5b57b88f59ff1c8e35b158b37da189415bb03f24fd4754bca5a20965e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRG:T6a+rdOOtEvwDpjNtf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_83e0abd2397be3b49ca959ef69b2f4e0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections