General

  • Target

    2024-05-03_0409e31310b302e7e3b009f8e288ac30_cryptolocker

  • Size

    74KB

  • MD5

    0409e31310b302e7e3b009f8e288ac30

  • SHA1

    5ff0f6bb38eaefcbf7d3c0cc188460b301b03e50

  • SHA256

    3b65010ed0086d4c92b0426b3f5711869999a6d492a71df38d17ddfe5fb9a3f1

  • SHA512

    b9ce9fb162b72f1d647213930ea1748ae1e99559a83354208618f8faab1f76d7b1a4cb90e3875248853f18019c8f801c3f9a334ad5fe587ab6f617f484df5de6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVrp:1nK6a+qdOOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-03_0409e31310b302e7e3b009f8e288ac30_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections