General

  • Target

    2024-04-22_ac70e510a38708ea3bae3bba1baad339_cryptolocker

  • Size

    73KB

  • MD5

    ac70e510a38708ea3bae3bba1baad339

  • SHA1

    b9d5c5d45800f5b3f0b4136cd24df41503e54385

  • SHA256

    b12b9914c6566600181a088ad7628b9fd1a42645ca189210344b2656947d635a

  • SHA512

    780d0c2f81c3f48d5ae801d2a95ca6f831422f495d38c7254ce80e75f1cbdb6b247d6be8d79b2536a87d19746b2238d5aa0a5bfb2661638d5a893855a526eacf

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBK:z6a+CdOOtEvwDpjQ8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_ac70e510a38708ea3bae3bba1baad339_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections