General

  • Target

    2024-04-24_01fcf14ffd52f1547f0f35dcbc78fd45_cryptolocker

  • Size

    89KB

  • MD5

    01fcf14ffd52f1547f0f35dcbc78fd45

  • SHA1

    aedcee6d270710f96ca7096d85b5930ec9458d3a

  • SHA256

    607ff30e1cc392e4c61ddeb2b550aea6271aea771634b26b3d1006ddf5b2d2c1

  • SHA512

    7a3f0a0fa22520326b25322bd3a6926f3dc2277f670b664caacdf32bd755f484229abcd3565bd154dc520c8cf9c6305a5abb3f4b6f7d413b50dfb17ca9656125

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAh:n6a+1SEOtEvwDpjYYvQd2Pi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_01fcf14ffd52f1547f0f35dcbc78fd45_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections