General

  • Target

    2024-05-10_3679a550b45f58954eecfc95fe28fd40_cryptolocker

  • Size

    77KB

  • MD5

    3679a550b45f58954eecfc95fe28fd40

  • SHA1

    dee6a227bd30204abf61dd7970d2871d14ac539d

  • SHA256

    f6295926a962b015ab7ae89b0f72d4c83972a83c53c1a1ef013b4f3a9a28375d

  • SHA512

    49cc96d346f495a051361b2441d026c942d866371deed279fff9cd5686b86da30dccdcc40cbd90646a0eabf1bb7cefa45235fdf246d5765a3492a06610746415

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnR:T6a+rdOOtEvwDpjNtHPq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_3679a550b45f58954eecfc95fe28fd40_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections