General

  • Target

    2024-05-04_950d03825b9639a216bb9c47bb550aed_cryptolocker

  • Size

    93KB

  • MD5

    950d03825b9639a216bb9c47bb550aed

  • SHA1

    52fdc11a7d5fc5a9820913f8df74513a0535bc18

  • SHA256

    a743a2fdc20a50126178dbaf678e3b347b5a4c24c96f9e3b8ef2b418875aa8a3

  • SHA512

    dfefb85709ed5317cdfa8571a941732cdc3c5c954f209b90990746133926d5d0d2ecc6075fed690e19abcdd32c4405477c7de1b5626c28610b4ae123bfb9520d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/3:zCsanOtEvwDpjB3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_950d03825b9639a216bb9c47bb550aed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections