General

  • Target

    2024-04-11_10dbe4b9a48fd081024ba357ce47b8c6_cryptolocker

  • Size

    81KB

  • MD5

    10dbe4b9a48fd081024ba357ce47b8c6

  • SHA1

    8a61f90aef921453e6fd670ebd03fce39b7692da

  • SHA256

    04ddf7cd3d1064d5a74ae6171b81c3fb1dd769c7c9575905163e01d4927c7730

  • SHA512

    27208a0a77982de90a334e74dcef468255915056fbf87afc274a3c15e847b2d33aa50b1c54479f0a3bad37ac1047b3f2da3e772c96e48f55aa56264281f6efcc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qp2CEb:zCsanOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_10dbe4b9a48fd081024ba357ce47b8c6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections