General

  • Target

    2024-04-23_db09059d46e444923375b062d6403c57_cryptolocker

  • Size

    89KB

  • MD5

    db09059d46e444923375b062d6403c57

  • SHA1

    e992643b325f4e5a0308e044730333487dc281d4

  • SHA256

    ea7561b62fcb7244a31325a7ddf10b2357ab36cfe9067a5c4e1389c68e722539

  • SHA512

    33343795da6eba64a4d54355193b1a7ae18b83e2e1f9f79da99612c317adf99b5834948a6707ff75b9825ee1c37f016f1dbba04242c5d4a87c0898e76e2ff8f3

  • SSDEEP

    1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQAj:H6a+uSEOtEvwDpjrYvQd2Pj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_db09059d46e444923375b062d6403c57_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections