General

  • Target

    2024-05-02_925d42ab3af58cca67a0b8c223fe6e65_cryptolocker

  • Size

    80KB

  • MD5

    925d42ab3af58cca67a0b8c223fe6e65

  • SHA1

    eec78e846c0098b6983b2fd59a7cfce5830b51a9

  • SHA256

    b4ef2ecbda6114f36fb7e13e9c08290a503ed4a04afe4fd055b3397ef6e45561

  • SHA512

    86fae04067459bca8cb798b8b711670cfe1d3464eba871566eb150ecb7b2b244777fa4a6d50e9def578309de2434ddbeb64e8b37af99adc1ff06c423fed6979b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdef:T6a+rdOOtEvwDpjNtO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_925d42ab3af58cca67a0b8c223fe6e65_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections