General

  • Target

    2024-06-05_f3c08739108872f96e72ec9fe2e9f0f4_cryptolocker

  • Size

    67KB

  • MD5

    f3c08739108872f96e72ec9fe2e9f0f4

  • SHA1

    bb2fa7e9cf7410787ce9cb45ba57c4245028bd1e

  • SHA256

    76279fd54580fdaaafb15d3b3a32f9df8b5cb5fb4a7bb4b4a2150f050afc3333

  • SHA512

    fe201f9f5cf728f8f080415882e8dbb3efacf09db3a2389c028cfb4ce5a3257ad810fb43ff211d5effbe2b15995c4bc91d89d9511e2d8529b5d5478feda74dba

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRc:1nK6a+qdOOtEvwDpjh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_f3c08739108872f96e72ec9fe2e9f0f4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections