General

  • Target

    2024-04-06_659f5fb44461c8795c5e14b3dbc469c9_cryptolocker

  • Size

    95KB

  • MD5

    659f5fb44461c8795c5e14b3dbc469c9

  • SHA1

    292fc775f85d7f5a248cfc59a3fafec6fda843d2

  • SHA256

    706d8519fd3cbcd90b57b38eab3deae987597aa41f4983df898f6625eebb92ef

  • SHA512

    6fb78b97505ce8223a730e7deb73de972ca063b105d6d679940e479e1ef691afe86fa0801c42ad64d63764921ce58529e672c3350f63f0533db36578e2bf94b0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bL3:zCsanOtEvwDpjBf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_659f5fb44461c8795c5e14b3dbc469c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections