General

  • Target

    2024-05-11_69be9021c7dd2406fcf3a80a8e128f44_cryptolocker

  • Size

    77KB

  • MD5

    69be9021c7dd2406fcf3a80a8e128f44

  • SHA1

    5a03ce88c0fc209b73500d60ea123772509bedc9

  • SHA256

    3d9b9c576853fd1dc90fb885e140c7d42b1813933197115f4bb0f0eb0b864e57

  • SHA512

    4e3aa14d36de96816837e5ff380e4d1dec61ef15a0221259cee814124091733e75054e1388ec273655522089ebcd4b448d99f746cf57b1c06f4dfc01068c210c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1k:T6a+rdOOtEvwDpjNtHPP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_69be9021c7dd2406fcf3a80a8e128f44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections