General

  • Target

    2024-02-11_500bd60a10396e177f6388fa9df24b46_cryptolocker

  • Size

    80KB

  • MD5

    500bd60a10396e177f6388fa9df24b46

  • SHA1

    618fc6e020ae0cbd81b323a6ab507556cb4d6401

  • SHA256

    4512e5baa81d10c0dd9ba52377e7b087ddfb91f421de06fc5b1b1c282810467f

  • SHA512

    f7fb2f05c8e458279bb1791f668fa74f879adaf8670505c4c5a81db57722de1b487530a9a720eb76f0c1898000681ac8ab5c22b194e8d24ccfcd7f180dc88911

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2i:zCsanOtEvwDpjc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_500bd60a10396e177f6388fa9df24b46_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections