General

  • Target

    2024-04-16_05944e3603ee3a42a628491ef933fb5d_cryptolocker

  • Size

    99KB

  • MD5

    05944e3603ee3a42a628491ef933fb5d

  • SHA1

    a1c798e8c832c30abe2722fd779867cfc0b44b20

  • SHA256

    4feca0f17e932e74e123f40adf3db4579d24c2c1ba581c6205f3c4cdd21ebdf6

  • SHA512

    247e31d40b7196da478695367e7b66d83b0523cf16cb573ca9c664994148e7d816679139ca13b74d1d0c959f70b5f258af1e65639c70ee544047b214ba8d4d0e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiX3:z6a+CdOOtEvwDpjcz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_05944e3603ee3a42a628491ef933fb5d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections