General

  • Target

    2024-04-23_2dae9a1ebe8357c32e86c96e5759a618_cryptolocker

  • Size

    65KB

  • MD5

    2dae9a1ebe8357c32e86c96e5759a618

  • SHA1

    758e8ee0fb69e9d9694a83f0412fc149010bfe4e

  • SHA256

    8f02100e06e6aca74b1cb9db1bb603360d63449170071daed157bd7a58115bf0

  • SHA512

    84bbfbffbdca4763d7089ca9d757be29227ba97715ca703cea1af8ebd8c1d35fe60662639c0705f569c0513dc2321748c17c9a7e0e6c8786d3a85fab90e41166

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5BrQ:zj+soPSMOtEvwDpj4kpmeLmQ/0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_2dae9a1ebe8357c32e86c96e5759a618_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections