General

  • Target

    2024-05-11_a3c54959a8f0c71175804d18231cde33_cryptolocker

  • Size

    89KB

  • MD5

    a3c54959a8f0c71175804d18231cde33

  • SHA1

    bd50cc4b48d2bab2d5517c03180bba0cd565c6ac

  • SHA256

    68c4630625d8121b868636ae9c1e4e78b81048fe139d735c15798a19d22587fe

  • SHA512

    7e8876a014994298c2f9f60e30b70afe725e1ac28f8b99eea7bbf7b4ed8933ef282f2bb1e3e0690bca68897d5a659b3232d72d12573bce7c86447f76dd61117f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tybly:zCsanOtEvwDpjR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_a3c54959a8f0c71175804d18231cde33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections