General

  • Target

    2024-05-09_745bed57a9615d61bf8392d7e6e0bc64_cryptolocker

  • Size

    96KB

  • MD5

    745bed57a9615d61bf8392d7e6e0bc64

  • SHA1

    9892599418987d20dc92904b941878b26c3af26c

  • SHA256

    5b1a6b4354e30a1607ff1c2a56f1221b11e57c063140fb8ce4af5eaf45380aed

  • SHA512

    e8a6692086d0c23100b657bffc0e7e9a3cffcf2214f78049af0a4f3303ac3520eaac6e56095ee1bfdb4e12b4307b4b91efb607d31d88b48dcd28da8f3fb4f038

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqE:zCsanOtEvwDpjBR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_745bed57a9615d61bf8392d7e6e0bc64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections