General

  • Target

    2024-05-03_d6ba92b23696eab4eafc4e5625ec80fd_cryptolocker

  • Size

    83KB

  • MD5

    d6ba92b23696eab4eafc4e5625ec80fd

  • SHA1

    f1f64ec98de55f99a6da3d50ad0c252109cea7ad

  • SHA256

    0fd3aba941010c729176a5401af85b89cb7319d57a09e15ccb2b4c8a095abd05

  • SHA512

    487b04ab0c028264b9d40a3815c13abf7835a8f77eb88cf2917f9650e72e985b870b6e09d26f2308c9c9db9472b1ae863c25c23bb85777ff67d4bfbecfdc0c81

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1m:zCsanOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-03_d6ba92b23696eab4eafc4e5625ec80fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections