General

  • Target

    2024-05-10_c3a6bf39caaa84c6ba56a077e5938095_cryptolocker

  • Size

    65KB

  • MD5

    c3a6bf39caaa84c6ba56a077e5938095

  • SHA1

    f062309c42e070a852c40821e62c47a0e64ebb09

  • SHA256

    3c5c98f24e6cbce48dafea264b6a3b414c63ccbc280fe5e3cd72aef720bfad73

  • SHA512

    cbe8318b7279808e923193bae3298c33325300373bdce2032febe2b5d7840d8675611c1a9dadf734de8fa611ac1e7d48ac1e4ac45c22a153724ae2fa72914937

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xu:1nK6a+qdOOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_c3a6bf39caaa84c6ba56a077e5938095_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections