General

  • Target

    2024-05-13_d9e773b46028b37a93d01cda3ac0bae7_cryptolocker

  • Size

    75KB

  • MD5

    d9e773b46028b37a93d01cda3ac0bae7

  • SHA1

    81658e7613445e14f604565dbdc5c44429b93912

  • SHA256

    3e7f555c31d1e828244bb1b9def4fecdacac7810a95cdb1c951a9acdb95a1321

  • SHA512

    89b1aced0c18b59dfb5f88b7b67d305647b2bfd3aa10e353ef3897cb4c7245b7a36bf0e6e0ebf67ebffb94e8754a4f1f67d32dbe2f8894347122c74d061599e9

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVri:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_d9e773b46028b37a93d01cda3ac0bae7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections