General

  • Target

    2024-05-14_aa42ba33024932b33e64efa133afee8d_cryptolocker

  • Size

    77KB

  • MD5

    aa42ba33024932b33e64efa133afee8d

  • SHA1

    d4581a279a0a21cf1b215f6d7fc0efd6a7158640

  • SHA256

    32128bcb1996ee332b58bb6b0a99d34fe1f1c5d30423d1fe75896cdc54c2f0c4

  • SHA512

    8b7a50cbade9436c24dffea8917393bfc4e5ee52a6f16e6529802de206798f123b49d54e5fa3159ad0cfe6ba978d60b5a1fe3e4e7f01f807a59e659f693bcebf

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx2:T6a+rdOOtEvwDpjNtHPF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_aa42ba33024932b33e64efa133afee8d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections