General

  • Target

    2024-04-30_30ea5a7579ee807d4a3f4666b32b7d0e_cryptolocker

  • Size

    65KB

  • MD5

    30ea5a7579ee807d4a3f4666b32b7d0e

  • SHA1

    d4b28750e59c3598f2030a7ce6fa5dbce688d0a8

  • SHA256

    3144ebfb9495a51b3b0881e7c9e6535b70770bdb96a2f5a0208fd4de5d8d9ffb

  • SHA512

    d81bae6ac6775aa06d12026764dd9755d1d2c1fe0e8cb87335fd3679d3b1e3d6d8276d6e12f8cb574bf2df4c37d9131263167a8e5a957be9822cc7d736303e60

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5Bf:zj+soPSMOtEvwDpj4kpmeLmQ/f

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_30ea5a7579ee807d4a3f4666b32b7d0e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections