General

  • Target

    2024-05-14_812041a87bda8fa656d392bc650659ef_cryptolocker

  • Size

    59KB

  • MD5

    812041a87bda8fa656d392bc650659ef

  • SHA1

    0b23c7010fb41e728c3bd2e1b512fc032c0fc225

  • SHA256

    4ac180bc1ff200ebdec214f95072201064474a1640608b73c4fe1c882e1461dc

  • SHA512

    ca9bfb17c449a3c4740d755a6318a27653754d09bc110b14e1ffc37020ac17a95d583a0a799537e0dadc497f50851ef2b1c1bd6a6066ef4c1d359603fa62c617

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pH:H6QFElP6n+gou9cvMOtEvwDpjCpVX5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_812041a87bda8fa656d392bc650659ef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections