General

  • Target

    2024-04-24_72f20bb4e90b47214cc85d68b8c326c5_cryptolocker

  • Size

    79KB

  • MD5

    72f20bb4e90b47214cc85d68b8c326c5

  • SHA1

    cbbd0103172695cb1299d99ac71716eca8e7a2aa

  • SHA256

    0a7d7190b9c81d8d5c0d4694509368ba27dbee463f0633d71117702f4d88af7a

  • SHA512

    9527df4180135e05b6cf4d5a4bf6dac0c4720db0dc13edcabd18b69f87b1869bae6e53039a01fc3db6d929a91ee140633c2ce1d1a375fa1ca4cf2cdd8b6545a5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqD:T6a+rdOOtEvwDpjNcY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_72f20bb4e90b47214cc85d68b8c326c5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections