General

  • Target

    2024-05-27_f4f0f7a27a53557e088e5fc6f4d48ff9_cryptolocker

  • Size

    75KB

  • MD5

    f4f0f7a27a53557e088e5fc6f4d48ff9

  • SHA1

    4ac7d621e378937b705ba9c797001d65f27c7c68

  • SHA256

    a011087c0b4a36adcf72d322e2702ba5e6800b7c1e662f07438de52bf21aabb2

  • SHA512

    ca3fc7870fee21b53d09c8c70d9b078c489ac82f31a4dfdd561491b172d8a3d9e61cb2edcaf3dedc8afb915c723f7dc3d7cea73f9cba552a976df83e9824c57f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gn:1nK6a+qdOOtEvwDpjO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-27_f4f0f7a27a53557e088e5fc6f4d48ff9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections