General

  • Target

    2024-04-29_8109bbc05f6ad4693c0b7cb06e528e08_cryptolocker

  • Size

    96KB

  • MD5

    8109bbc05f6ad4693c0b7cb06e528e08

  • SHA1

    bd1702bc34fba5355e773acca6e0a1f58d2f0580

  • SHA256

    5e266f7ca5cd941b6fe81c4c99d86305376548641c2e50a50ff7b71dd6de5ebc

  • SHA512

    a9c8b42720c80f12753144f2a42263e20b01e1cbe86fa66442f18b13f31b32bd048751e6fdb5d45167b4420441d77d4e5b0c9d548715c9f288b087633139da24

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqB:zCsanOtEvwDpjBU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_8109bbc05f6ad4693c0b7cb06e528e08_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections