General

  • Target

    2024-05-11_0846c3ee74641ba0b027e1f9d820baec_cryptolocker

  • Size

    97KB

  • MD5

    0846c3ee74641ba0b027e1f9d820baec

  • SHA1

    5710baad23bb378f4b4a175f7d8d5cbab7a87938

  • SHA256

    a743e408b0da6aacbe786375ad3ad3ffea4559297dcaa2f9ac15db600aacd5b2

  • SHA512

    71916dd81276ffd21aadd77c5049bbacf1a19ca5bc74c6c4d67bc74bd2cd08b15e697bd612bc4d1eaf6d07973476d11aaeb804f86d3ceb20f773bc00e5e55530

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqP0:zCsanOtEvwDpjBx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_0846c3ee74641ba0b027e1f9d820baec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections