General

  • Target

    2024-05-02_0e62033e9d5723428a79b520eae8e462_cryptolocker

  • Size

    80KB

  • MD5

    0e62033e9d5723428a79b520eae8e462

  • SHA1

    959119c3bf085e392e81e0da49d25b9ddcc8267c

  • SHA256

    6493cef4e750a43e7ac3975d97748d811d1499a007a52b8b9502cc9236ff4c5e

  • SHA512

    6855b6ed5062e34fa6661ecff09d85ffabc8a2bf852a5a033c4adb75d19fafed79464e4de9677b4298a3b62b5cb586525278cb90b9fe0c35785573a539b58420

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdbf:T6a+rdOOtEvwDpjNtV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_0e62033e9d5723428a79b520eae8e462_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections