General

  • Target

    2024-05-14_42e5860a251c6f4ec61c0b5f6f881f99_cryptolocker

  • Size

    63KB

  • MD5

    42e5860a251c6f4ec61c0b5f6f881f99

  • SHA1

    ce841e2ce14a96368bcc2ce3e69b037c78334e75

  • SHA256

    f8f98cc9d96c14cfe347f49baecdff87554b097a324b0c1f4a5667de3faed1d8

  • SHA512

    2a64c853a0a7d9ccb404d3fb14b552bbcaa693ad86ed4771c1c8d69b06e103c9c8b16e1a8254f25c52d57d5a1c107df331277040aa009d00f67c8213c81db796

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKr:P8mnK6QFElP6n+gymddpMOtEvwDpjYM0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_42e5860a251c6f4ec61c0b5f6f881f99_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections