General

  • Target

    2024-05-10_16fa9ffd82451955212a23a0020e15f1_cryptolocker

  • Size

    65KB

  • MD5

    16fa9ffd82451955212a23a0020e15f1

  • SHA1

    47a870dbc883b8e30a1453d2eabe4c975e02d1a3

  • SHA256

    2b92d96f5134357fcbdf72396235f0d543636eac905afb2767a89b609d551cb0

  • SHA512

    500a2d39b43ebdd0d5c68dda7d332fe3bd4b453e38a406e9efe16de0a523a0812c42b713e6748f58bc47b729c9d90feee361dcef88a93e30b56d107524547e2a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xgy:1nK6a+qdOOtEvwDpjX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_16fa9ffd82451955212a23a0020e15f1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections