General

  • Target

    2024-05-05_242fc1afa5da8071beb3ddd2043a4501_cryptolocker

  • Size

    89KB

  • MD5

    242fc1afa5da8071beb3ddd2043a4501

  • SHA1

    1fd84c5ce9d3b333437a6a53827b889773c196ff

  • SHA256

    ce1f31c11cccf8f1781180e00bff24b292184ecc25a1dad173299dc1bbbbffef

  • SHA512

    5cd3cd6305592e1402d4da28aeb1ab0b1740463ead0457aaa5a9f188c1db21493d10b8e91d35f18573332d284899a705a99156c00cc1e40dc000e6edf7a04e89

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAR:n6a+1SEOtEvwDpjYYvQd2PR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-05_242fc1afa5da8071beb3ddd2043a4501_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections