General

  • Target

    2024-05-11_a539a7cdd6a6253f6d5b0fa5d0aa923e_cryptolocker

  • Size

    89KB

  • MD5

    a539a7cdd6a6253f6d5b0fa5d0aa923e

  • SHA1

    826d983b8939538f9ac76e4e9b9e910171f1b485

  • SHA256

    d4ed09d1baa23056644cfa2a973624d128d02649108c2f9f8249df7a80e20d94

  • SHA512

    8eb765245f398fbee33a745e426b5940e891165daeaade501341341b1c702018b26881225c75b1b9fc44f260b28c5fb53e28c1a908de6ab9d0c8ea54c6fa416a

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tybla:zCsanOtEvwDpjJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_a539a7cdd6a6253f6d5b0fa5d0aa923e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections