General

  • Target

    2024-04-09_df2ab5a3a73843c474e53cf67d9d6df9_cryptolocker

  • Size

    59KB

  • MD5

    df2ab5a3a73843c474e53cf67d9d6df9

  • SHA1

    601a307ac0ab1e56c0697093560a37638a6ffa6f

  • SHA256

    1defa7bfb549d0c381963e20edd2b99f545957cdfe2d518bc7fa68489de9e0c5

  • SHA512

    5ea57f3236e232e60a5a0a8990638975b8668a69a3156e4637fc47e767aecfc2b28ddfbe6dae3f24b7a8dd6ec6f40daa250a393ed7033edb09bdc8741b085cfc

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpysnrz:zj+soPSMOtEvwDpj4yRrz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_df2ab5a3a73843c474e53cf67d9d6df9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections