General

  • Target

    2024-04-29_de150c3ac84e93ca294e5be778bf6a10_cryptolocker

  • Size

    66KB

  • MD5

    de150c3ac84e93ca294e5be778bf6a10

  • SHA1

    daa2a42c7c6798139eb8d40592d5bf8c54311d3c

  • SHA256

    0cba67777d419c59d942bba5725c088f204de3328919b819d5393993852d62d1

  • SHA512

    0595aa488832d2a485f430c79cfa690eb3a56a172210e3bf0e6519bffe3d371fa838da26978e76221f4a221bb9c700d466f2337d08aafcbe6c66b7ed18ba8e63

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5BvU:zj+soPSMOtEvwDpj4kpmeLmQ/M

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_de150c3ac84e93ca294e5be778bf6a10_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections