General

  • Target

    2024-05-13_ba244f3c90b6c64d443004e1c43c0e2e_cryptolocker

  • Size

    109KB

  • MD5

    ba244f3c90b6c64d443004e1c43c0e2e

  • SHA1

    94a5f447b4674277ebaec5508c60aa276615d43c

  • SHA256

    60cb6b999117ae3a6ddc28170994f16097ad8c9d954d6d9c4ce4b5114e719e82

  • SHA512

    86267f3fba550b0fbb7faabeb1ebd36de7ce60dbfe78fe2825fe8692438061b31e2e7e77182aac21d30ceb8ba32ef46628b13e5a9559280d11e5fcfa2be0caa1

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkszfFF:1nK6a+qdOOtEvwDpj7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_ba244f3c90b6c64d443004e1c43c0e2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections