General

  • Target

    2024-04-29_6268aa427b7e390a73a437614b66e4ae_cryptolocker

  • Size

    89KB

  • MD5

    6268aa427b7e390a73a437614b66e4ae

  • SHA1

    937de56df3be651dbbf21fa8f530e02072613934

  • SHA256

    3329fc7e53f4bfb1b7fa735b29b795c32508b4ee934217b372fcb1507372aeb6

  • SHA512

    3484c84141f2b549ba078098dd63c3c9469457d6a713bd91e858d553a8da602aafd2dec6b6c64cd9411ba69700545e376405323482850876cc815459239d832e

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAc:n6a+1SEOtEvwDpjYYvQd2Pc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_6268aa427b7e390a73a437614b66e4ae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections