General

  • Target

    2024-03-15_591aa5f91734b63f1c303ace42949a2f_cryptolocker

  • Size

    94KB

  • MD5

    591aa5f91734b63f1c303ace42949a2f

  • SHA1

    8a0c29ca37c6cec4cd9e818304240cb235a5e2d9

  • SHA256

    716d6987df3fbd3565ce7f01bec62b832506e494dcb4d284443b93ff0ef1125b

  • SHA512

    d9211562ce6d4cd5159b18c46c7a7279169686934caf76a1cb09baf9d766fafcb4f2b5d19e7d0e8d3e59e168d319cda5a03586025e3d0e57a9e6e9c9c29ada8d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/f:zCsanOtEvwDpjBf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_591aa5f91734b63f1c303ace42949a2f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections