General

  • Target

    2024-05-04_dfa1d080376934e083d3f3552225d828_cryptolocker

  • Size

    80KB

  • MD5

    dfa1d080376934e083d3f3552225d828

  • SHA1

    f6a01d8b2c9acb4f8f62649b144da8d692e84255

  • SHA256

    bfb9d8d0681e195617afb4d6e51711516277a27cd61ad1a9b07912708a4cd621

  • SHA512

    a21a70f1fc4e9d19f2c809fd7b323e1845b37762a41d346418836c5201098a463b87a3bbaf29528a9b513c5847273a63f793734e3636da813b5f7f00ba759659

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdP:T6a+rdOOtEvwDpjNtJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_dfa1d080376934e083d3f3552225d828_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections