General

  • Target

    2024-04-21_5a66ae823209ee57e099b93617e73e5c_cryptolocker

  • Size

    82KB

  • MD5

    5a66ae823209ee57e099b93617e73e5c

  • SHA1

    6c9343428b8faa6128be420a2470509a520928cc

  • SHA256

    30df7f3fe5b6bac9731d7d14abf9b184eb96092a9bde2697955a5a9d1e766c19

  • SHA512

    8c0b97c43697d28056b13586c051a91e7586f6b30be6f94205899a2c8b7086b2b422bc211daa5f1110c5b331531678158c5c129d2d20c96e456bc556c050889c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0M:T6a+rdOOtEvwDpjNt7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_5a66ae823209ee57e099b93617e73e5c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections