General

  • Target

    2024-05-13_42a9d7183d54cf204752e98237879f00_cryptolocker

  • Size

    65KB

  • MD5

    42a9d7183d54cf204752e98237879f00

  • SHA1

    36e3b60b71cd83bb09d8e0b0bc827e805e48bb22

  • SHA256

    1a4baf58b16f9be8d57b8a52e93a6df3f664a4b51b474cc099ef99ebec658bc6

  • SHA512

    ad5b7cac4aae70a5b226bb5c92d6f3f6e6fc6a1389471f2b1da178b046e67702804a2ed813d05ffffd5e53f6f55575f49e28939303ca0929cb4181f629f5a72a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXMK:1nK6a+qdOOtEvwDpjF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_42a9d7183d54cf204752e98237879f00_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections