General

  • Target

    2024-04-30_009a31e96070fce1edd478ea3fb518ec_cryptolocker

  • Size

    89KB

  • MD5

    009a31e96070fce1edd478ea3fb518ec

  • SHA1

    ec4719353638e66cfc9f7876fcd7cf035aded421

  • SHA256

    d6e04ebb42bacefce200a502030e8de2a767ee2b357a8dc22f585cdcf198ebbf

  • SHA512

    2a352b3086f5b0d4539799e9d4c9af8facbeb846ee3b0a343a1a1b06b93fae6f176ac848220c5d327b12e785c1e8e2243b54b6b9f40c33f6e50c20a3ac4cac86

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAM:n6a+1SEOtEvwDpjYYvQd2PM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_009a31e96070fce1edd478ea3fb518ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections