General

  • Target

    2024-05-01_352ad9ed1b36fa434325e74cea672d42_cryptolocker

  • Size

    73KB

  • MD5

    352ad9ed1b36fa434325e74cea672d42

  • SHA1

    532c163eff2c2cb2eec49149e9c7c5cf5d58baa0

  • SHA256

    683c2eba6d0e86f0fc4089da1da2618dad946057222df62aaeb461a431f9949b

  • SHA512

    d014874ab41d1b3ea816e88ce3e5cb26d0a9aaf7ec5d9de8d80f2466062a64d65cc53d4ea7f7158960c0ed4be715d8bbf7ad584a96ece48582f316d3d9b87b9d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVy:1nK6a+qdOOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_352ad9ed1b36fa434325e74cea672d42_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections