General

  • Target

    2024-05-12_0e51e9f852a4e2699b2e28bb9f8a6b33_cryptolocker

  • Size

    59KB

  • MD5

    0e51e9f852a4e2699b2e28bb9f8a6b33

  • SHA1

    ac3c140437e3f5990d0cf4e048278b48e5600bda

  • SHA256

    1b06b6a5afd7846a383462e14fa81e766fa550671afd1c587c32eac380721a61

  • SHA512

    e54b3d1fc37c4245d68a6654679bdf8ebd63bda2d65d28d9b98d4ff7146a2ed12aaeffe833d6c79ef01c501608787f6b46af0f9fd12e059a7e88f68444930ec1

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPB+:H6QFElP6n+gou9cvMOtEvwDpjCpVXY+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_0e51e9f852a4e2699b2e28bb9f8a6b33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections