General

  • Target

    2024-01-18_ba5df60aa48c9b697d792aedca68f83b_cryptolocker

  • Size

    64KB

  • MD5

    ba5df60aa48c9b697d792aedca68f83b

  • SHA1

    ecdbd8e415f66a56acb824fda4a60b2e5fa1be43

  • SHA256

    af0e61439eedc26e622fe6230df67ebd69c30b820ef8b1034065d927aacd497d

  • SHA512

    bec8f42340491541c8a48c1180b94244d3bdf5c396553dbd385ffcef662cdd81cd170bd3bd93632989150733c481d5a030b0d71392093594ec1535819e24a6d3

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gZSMum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+gZSZmddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_ba5df60aa48c9b697d792aedca68f83b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections