General

  • Target

    2024-04-30_aa61b0702c4fe34a600fa0c5306f1cf5_cryptolocker

  • Size

    122KB

  • MD5

    aa61b0702c4fe34a600fa0c5306f1cf5

  • SHA1

    97a4240c1adc5dbac1bf1cc04e1cf85318253a3b

  • SHA256

    ef8c95b37505873c27ddf1fe7b8996656c236a2ee195d79228ba6fe1d001a1eb

  • SHA512

    482f0b4f134933fd9f5d88b8422c4392aabd80ad8e093fef6be34b41503584dc5b5246257548b0f644b01a3231501041f0fea98fa024cbfc1b4c02a147d30e23

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviPeBeW:z6a+CdOOtEvwDpjczI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_aa61b0702c4fe34a600fa0c5306f1cf5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections