General

  • Target

    2024-04-05_d0bc402c1ef4fe96ff8ac97c2e66246e_cryptolocker

  • Size

    65KB

  • MD5

    d0bc402c1ef4fe96ff8ac97c2e66246e

  • SHA1

    c428ff9d5ab52509d0b7a871d4b37da3bf5bc79f

  • SHA256

    12264fbfc4eaf1f6b0f8f1b603699b3172409040ab2c814ed6f952af91ac620c

  • SHA512

    d5c25b8cea9bba52cd6816a39d4b1cd6d9e6060f76e83f09ac07a885d4bcc29b5724dc2030d7aaec53443130f9b2961e419894e8ef0953176eba8656ea57a6b2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRT:1nK6a+qdOOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_d0bc402c1ef4fe96ff8ac97c2e66246e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections