General

  • Target

    2024-05-14_f0a7e0036a121de9db9f1a466f0d756e_cryptolocker

  • Size

    81KB

  • MD5

    f0a7e0036a121de9db9f1a466f0d756e

  • SHA1

    1272d1cb8dd4445306f74e23c99c32c69d5c3509

  • SHA256

    0aade5863bb5944e2812bfa925db4a54e8e2e3a274fb2b10e334557552c80afc

  • SHA512

    6196c3152e1adb6648c0d8a34f611e946f994d9b59bfa291710f3d29ee550f3293c3f192aa7bb41b53e2948bafe8469ff9507b929ec8c7be7112329bf0d33ba3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QD:zCsanOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_f0a7e0036a121de9db9f1a466f0d756e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections