General

  • Target

    2024-05-25_d3902d69fa2252ca39be5a1c7c418714_cryptolocker

  • Size

    74KB

  • MD5

    d3902d69fa2252ca39be5a1c7c418714

  • SHA1

    4cc71e8abbb6f584e3560d919c7032d2a608069c

  • SHA256

    3a7da0c056a9e87a4fe7a82fd1631a914029cb6fef835868e136b1c20c98eaab

  • SHA512

    f9ae9963ac5e2d8f13eefb0652b21e22952bd5f33504be47beb456445cebcb6fdbd488e9c991bbcb76f2dbe33db7395fd3ba40265f133cc34e1858ecc7cd2623

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81GB:1nK6a+qdOOtEvwDpjk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-25_d3902d69fa2252ca39be5a1c7c418714_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections