General

  • Target

    2024-05-07_ba86c1e2fea65e433dd11d891345ba48_cryptolocker

  • Size

    78KB

  • MD5

    ba86c1e2fea65e433dd11d891345ba48

  • SHA1

    a1b38f49248d90f8b2fd42336542313a7dc4f4fa

  • SHA256

    2ac433e5e87c9b63529b4e62f4e7948133c964d2b46da846a1e037d3a96eb4a8

  • SHA512

    dfdc40aff1bda9c4d87b21701730d870263c3853d51a4fb6ca20b2981e9a295c36cf18b17213e201c15c058698955ec3aa07dfeceb916c63b9279e5af794c705

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1N:T6a+rdOOtEvwDpjNtHPa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-07_ba86c1e2fea65e433dd11d891345ba48_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections