General

  • Target

    2024-05-14_1d5ce142a32bbc581d80b0a69636387c_cryptolocker

  • Size

    81KB

  • MD5

    1d5ce142a32bbc581d80b0a69636387c

  • SHA1

    e315c221ceba1badaa768f5ff4bf5ebbfdd0c1ba

  • SHA256

    2979722652bb3492be0e497dbd36d7f862114e53f6329a36200d2f73ef4e7bd8

  • SHA512

    ae6b42288870f042113e2166cc8d4b8ea284a22521f50191575d6b4d3c988cbfbd21581b39b2c7f6f561fdce0ebc3d7b5b6a1f0f1717f4e2b94c380374adcfcd

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QpA:zCsanOtEvwDpj2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_1d5ce142a32bbc581d80b0a69636387c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections