General

  • Target

    2024-04-24_739fc828412ce3301eca6eea8841e0ee_cryptolocker

  • Size

    80KB

  • MD5

    739fc828412ce3301eca6eea8841e0ee

  • SHA1

    19ad1c42130e2c4958036b2355b4433e1cfe0aef

  • SHA256

    8f9215572306cbfabcd622c0015c1f92fc3c21777a53ae91246e62233d7dd4c2

  • SHA512

    60d4b78751c42b02d96fdc8dd7cd37c6631ae4343b1bc9c9f5ddf63737c3d40b9110795ed920a8a09cf1483b5e29dcde0ce1017c5ce8d4674fc31ff47595810d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qe:zCsanOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_739fc828412ce3301eca6eea8841e0ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections