General

  • Target

    2024-06-12_c3c9bfed5970e9a1df74de7d034bd172_cryptolocker

  • Size

    89KB

  • MD5

    c3c9bfed5970e9a1df74de7d034bd172

  • SHA1

    72842a955b8f7da3a56f24c6e1ae442d58db8e67

  • SHA256

    edc8a4bc17fade320f00bfe530bd822000f860cdd506b6b86d7798f6ad7cb4f0

  • SHA512

    06ea51f042e3c6a4dd70b545a86192aa19aff82d340400e767921e9a82839f8ceaf9245ccecaefbee41eb14e7d02f8b9e0a42fbd5d5fcb9b7986ad379bb621dc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tybl0:zCsanOtEvwDpj7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_c3c9bfed5970e9a1df74de7d034bd172_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections